Cover
Vol. 22 No. 1 (2026)

Published: June 15, 2026

Pages: 254-267

Original Article

Adaptive Multi Objective Chicken Swarm Optimization for Solving Nonlinear Stream Cryptosystem

Abstract

Nonlinear stream ciphers have become a viable alternative to traditional cryptosystems in response to the growing need for secure communication. These ciphers generate a keystream via feedback mechanisms and nonlinear functions, which are then utilized for encryption. Geffe generator system is one of the most keystream generators. Also, these systems have many benefits, like being fast, flexible, and able to create unpredictable and non-repeating keystreams, these systems are susceptible to cryptanalysis attacks, which have the potential to compromise their security. This paper presents the first study of applying chicken swarm optimization (CSO) algorithm in the field of cryptanalysis based on cipher only attack. The standard CSO algorithm and an adaptive multi points CSO (AMPCSO) algorithm are proposed to cryptanalysis nonlinear stream cipher based on Geffe keystream generator. Firstly, the traditional CSO is used to reveal the secret initial values of the Geffe generator. Secondly, an adaptive multi points chicken swarm optimization (AMPCSO) has been proposed to enhance the traditional CSO algorithm to attack Geffe generator systems. The AMPCSO is a new idea to advance the CSO search abilities and improve the foraging behavior of hens and chicks by allowing hens to be influenced by other individuals within the same or different groups and affected by the best individual in the population and enable chicks to learn from four reference points rather than learn from their respective mothers only. Lastly, a new criterion is used to estimate the value of fitness by utilizing a multi-objective fitness function (MOFF), which is grounded on Pareto dominance. The experimental results showed that the CSO and AMPCSO are very effective tools in terms of accuracy, information required, and CPU times when applied to the analysis of nonlinear stream cipher. The AMPCSO required a few characters from ciphertext to attack systems with total LFSRs length up to 59 bits with an appropriate CPU time.

References

  1. C. Chris, “Review of history of cryptography and cryptanalysis by john dooley,” Cryptologia, vol. 43, no. 6, pp. 536–538, 2019.
  2. N. Munir, M. Khan, T. Shah, A. Alanazi, and I. Hussain, “Cryptanalysis of nonlinear confusion component based encryption algorithm,” Integration, vol. 79, pp. 41–47, 2021.
  3. M. Ahmed, A. Shibeeb, and A. Mohammed, “Solve polyalphabetic cipher based on intelligent system,” in Proc. of International Conf. On Communication & Information Technology (ICICT), (Basrah, Iraq), pp. 290–296, 2021.
  4. Y. Feng, H. Wang, C. Chang, H. Lu, F. Yang, and C. Wang, “A novel nonlinear pseudorandom sequence generator for the fractal function,” Fractal and Fractional, vol. 6, no. 10, p. 589, 2022.
  5. S. Gupta, P. Singh, N. Shrotriya, and T. Baweja, “Lfsr next bit prediction through deep learning,” Journal of Informatics Electrical and Electronics Engineering (JIEEE), vol. 2, no. 2, pp. 1–9, 2021.
  6. S. Karthika and K. Singh, “Cryptanalysis of stream cipher lizard using division property and milp based cube attack,” Discrete Applied Mathematics, vol. 325, pp. 63–78, 2023.
  7. A. K. Shibeeb and M. H. Ahmed, “Use of a new approach to automated break transposition cipher system,” IOP Conference Series Materials Science and Engineering, vol. 518, p. 052020, May 2019.
  8. G. Wang, D. Cheng, D. Xia, and H. Jiang, “Swarm intelligence research: From bio-inspired single-population swarm intelligence to human-machine hybrid swarm intelligence,” Machine Intelligence Research, vol. 20, no. 1, pp. 121–144, 2023.
  9. X. Meng, Y. Liu, X. Gao, and H. Zhang, “A new bioinspired algorithm: chicken swarm optimization,” in Proc. of 5th International Conf of Advances in Swarm Intelligence (ICSI 2014), (Hefei, China), pp. 86–94, Springer, 2014.
  10. Z.Wang, C. Qin, B.Wan,W.W. Song, and G. Yang, “An adaptive fuzzy chicken swarm optimization algorithm,” Mathematical Problems in Engineering, vol. 2021, p. 1–17, Mar. 2021.
  11. D. Wu, F. Kong, W. Gao, Y. Shen, and Z. Ji, “Improved chicken swarm optimization,” in Proc. of International Conf of IEEE on Cyber Technology in Automation Control and Intelligent Systems (CYBER), (Shenyang, China), pp. 681–686, 2015.
  12. N. Irsalinda, A. Thobirin, and W. Wijayanti, “Chicken swarm as a multi step algorithm for global optimization,” International Journal of Engineering Science Invention, vol. 6, no. 1, pp. 8–14, 2017.
  13. M. Lin, Y. Zhong, J. Lin, and X. Lin, “Enhanced chicken swarm optimisation for function optimisation problem,” International Journal of Wireless and Mobile Computing, vol. 15, no. 3, pp. 258–269, 2018.
  14. D. He, G. Lu, and Y. Yang, “Research on optimization of train energy-saving based on improved chicken swarm optimization,” IEEE Access, vol. 7, pp. 121675–121684, 2019.
  15. J. Wang, F. Zhang, H. Liu, J. Ding, and C. Gao, “Interruptible load scheduling model based on an improved chicken swarm optimization algorithm,” Journal of Power and Energy Systems, vol. 7, no. 2, pp. 232–240, 2021.
  16. X. Liang, D. Kou, and L. Wen, “An improved chicken swarm optimization algorithm and its application in robot path planning,” IEEE Access, vol. 8, pp. 49543– 49550, 2020.
  17. M. Gamal, A. El-Sawy, and A. AbuEl-Atta, “Hybrid algorithm based on chicken swarm optimization and genetic algorithm for text summarization,” International Journal of Intelligent Engineering and Systems, vol. 14, p. 319–331, May 2021.
  18. Y. Gu, H. Lu, L. Xiang, and W. Shen, “Adaptive simplified chicken swarm optimization based on inverted s-shaped inertia weight,” Chinese Journal of Electronics, vol. 31, p. 367–386, Mar. 2022.
  19. L. Liang, L. Wang, and M. Ma, “An improved chicken swarm optimization algorithm for solving multimodal optimization problems,” Computational Intelligence and Neuroscience, vol. 2022, 2022.
  20. L. Liang, L. Wang, and M. Ma, “An adaptive dualpopulation collaborative chicken swarm optimization algorithm for high-dimensional optimization,” Biomimetics, vol. 8, no. 2, p. 210, 2023.
  21. M. Din, A. Bhateja, and R. Ratan, “Cryptanalysis of geffe generator using genetic algorithm,” in Proc. of International Conf. On Soft Computing for Problem Solving: SocProS 2013, vol. 259, (New Delhi), pp. 509–515, Springer, 2014.
  22. I. Polak and M. Boryczka, “Genetic algorithm in stream cipher cryptanalysis,” in Proc. of International Conf. On Computational Collective Intelligence, ICCCI 2015, vol. 9330, (Madrid, Spain), pp. 149–158, 2015.
  23. K. Pommerening, “Cryptanalysis of nonlinear feedback shift registers,” Cryptologia, vol. 40, no. 4, pp. 303–315, 2016.
  24. M. Din, S. Pal, S. Muttoo, and A. Jain, “Applying cuckoo search for analysis of lfsr based cryptosystem,” Perspectives in Science, vol. 8, pp. 435–439, 2016.
  25. S. Al-Ageelee and R. Kadhum, “Cryptanalysis of nonlinear stream cipher cryptosystem based on improved particle swarm optimization,” International Journal of applied information systems, vol. 19, no. 1, pp. 78–84, 2017.
  26. S. Sadkhan and B. Yaseen, “A dna-sticker algorithm for cryptanalysis lfsrs and nlfsrs based stream cipher,” in Proc. of International Conf. On Advanced Science and Engineering (ICOASE), (Duhok, Iraq), pp. 301–305, 2018.
  27. M. Din, S. K. Pal, and S. K. Muttoo, Applying PSO based technique for analysis of GEFFE Generator Cryptosystem, p. 741–749. Aug. 2018.
  28. I. Polak and M. Boryczka, “Tabu cryptanalysis of vmpc stream cipher,” Tatra Mountains Mathematical Publications, vol. 73, no. 1, pp. 145–162, 2019.
  29. I. Polak and M. Boryczka, “Tabu search in revealing the internal state of rc4+ cipher,” Applied Soft Computing, vol. 77, pp. 509–519, 2019.
  30. G. Mishra, I. Gupta, S. Murthy, and S. Pal, “Deep learning based cryptanalysis of stream ciphers,” Defence Science Journal, vol. 71, no. 4, pp. 499–506, 2021.
  31. R. Rizk-Allah, H. Abdulkader, S. Elatif, W. Elkilani, E. Al Maghayreh, H. Dhahri, and A. Mahmood, “A novel binary hybrid pso-eo algorithm for cryptanalysis of internal state of rc4 cipher,” Sensors, vol. 22, no. 10, p. 3844, 2022.
  32. R. Jawad, “Proposed hybrid technique in cryptanalysis of cryptosystem based on pso and sa,” Iraqi Journal of Science, vol. 63, no. 10, pp. 4547–4558, 2022.
  33. A. Ayvaz, “An improved chicken swarm optimization algorithm for extracting the optimal parameters of proton exchange membrane fuel cells,” International Journal of Energy Research, vol. 46, p. 15081–15098, June 2022.
  34. Y. Zhang, L. Wang, and J. Zhao, “Pecso: An improved chicken swarm optimization algorithm with performance-enhanced strategy and its application,” Biomimetics, vol. 8, no. 4, 2023.
  35. Y. Gu, H. Lu, L. Xiang, and W. Shen, “Adaptive simplified chicken swarm optimization based on inverted s-shaped inertia weight,” Chinese Journal of Electronics, vol. 31, no. 2, pp. 367–386, 2022.
  36. Y. Wang, C. Sui, C. Liu, J. Sun, and Y. Wang, “Chicken swarm optimization with an enhanced explorationexploitation tradeoff and its application,” Soft Computing, vol. 27, no. 12, pp. 8013–8028, 2023.
  37. Z. Wang, W. Zhang, Y. Guo, M. Han, B. Wan, and S. Liang, “A multi-objective chicken swarm optimization algorithm based on dual external archive with various elites,” Applied Soft Computing, vol. 133, 2023.
  38. W. Osamy, A. El-Sawy, and A. Salim, “Csoca: Chicken swarm optimization based clustering algorithm for wireless sensor networks,” IEEE Access, vol. 8, pp. 60676– 60688, 2020.
  39. X. Zhou, Z. Gao, and X. Yi, “An improved chicken swarm optimization algorithm based on adaptive mutation learning strategy,” Journal of Computers, vol. 33, no. 6, pp. 1–19, 2022.
  40. R. Al-Amri, D. Hamood, and A. Farhan, “Theoretical background of cryptography,” Mesopotamian Journal of CyberSecurity, pp. 7–15, 2023.
  41. S. Wadhawan, “A study on cryptography,” International Journal of Engineering and Management Research, no. 2, pp. 99–103, 2023.
  42. A. Babu and B. Anand, “Modified dynamic current mode logic based lfsr for low power applications,” Microprocessors and Microsystems, vol. 72, p. 102945, 2020.
  43. B. Ali, M. Zaite, and A. Al-Hashimi, “Design and implementation of a key generator-based stream cipher for securing text data,” Journal of Engineering Science and Technology, vol. 14, no. 6, pp. 3372–3386, 2019.
  44. A. Naser and F. Majeed, “Constructing of analysis mathematical model for stream cipher cryptosystems,” Iraqi Journal of Science, vol. 58, no. 2A, pp. 707–715, 2017.
  45. H. Maier, S. Razavi, Z. Kapelan, L. Matott, J. Kasprzyk, and B. Tolson, “Introductory overview: Optimization using evolutionary algorithms and other metaheuristics,” Environmental modelling & software, vol. 114, pp. 195– 213, 2019.
  46. V. Vera and C. A´ vila, “Graphemic-phonetic diachronic linguistic invariance of the frequency and of the index of coincidence as cryptanalytic tools,” Plos one, vol. 14, no. 3, 2019.
  47. S. Zhu, L. Xu, E. Goodman, K. Deb, and Z. Lu, “A general framework for enhancing relaxed pareto dominance methods in evolutionary many-objective optimization,” Natural Computing, vol. 22, no. 2, pp. 287–313, 2023.