Journal of Software Engineering and Applications

Volume 3, Issue 1 (January 2010)

ISSN Print: 1945-3116   ISSN Online: 1945-3124

Google-based Impact Factor: 1.22  Citations  h5-index & Ranking

Cryptanalysis of TEA Using Quantum-Inspired Genetic Algorithms

HTML  Download Download as PDF (Size: 392KB)  PP. 50-57  
DOI: 10.4236/jsea.2010.31006    8,547 Downloads   13,514 Views  Citations
Author(s)

Affiliation(s)

.

ABSTRACT

The Tiny Encryption Algorithm (TEA) is a Feistel block cipher well known for its simple implementation, small memory footprint, and fast execution speed. In two previous studies, genetic algorithms (GAs) were employed to investigate the randomness of TEA output, based on which distinguishers for TEA could be designed. In this study, we used quan-tum-inspired genetic algorithms (QGAs) in the cryptanalysis of TEA. Quantum chromosomes in QGAs have the advan-tage of containing more information than the binary counterpart of the same length in GAs, and therefore generate a more diverse solution pool. We showed that QGAs could discover distinguishers for reduced cycle TEA that are more efficient than those found by classical GAs in two earlier studies. Furthermore, we applied QGAs to break four-cycle and five-cycle TEAs, a considerably harder problem, which the prior GA approach failed to solve.

Share and Cite:

W. Hu, "Cryptanalysis of TEA Using Quantum-Inspired Genetic Algorithms," Journal of Software Engineering and Applications, Vol. 3 No. 1, 2010, pp. 50-57. doi: 10.4236/jsea.2010.31006.

Cited by

[1] Hybrid Quantum Metaheuristics: Theory and Applications
2022
[2] Breaking Data Encryption Standard with a Reduced Number of Rounds Using Metaheuristics Differential Cryptanalysis
Entropy, 2021
[3] 从演化密码到量子人工智能密码综述
2019
[4] Breaching Security of Full Round Tiny Encryption Algorithm
International Journal of Information Security and Privacy (IJISP), 2018
[5] IMPACT OF GENETIC ALGORITHM IN CRYPTOLOGY–AN EMPIRICAL STUDY
International Journal of Computer Engineering and Applications, 2018
[6] Optimisation heuristics in randomness testing
2017
[7] Quantum Genetic Algorithms for Computer Scientists
Computers, 2016
[8] Randomness analysis in authenticated encryption systems
2016
[9] New results on reduced-round Tiny Encryption Algorithm using genetic programming
2016
[10] TEA analysis using genetic programming
2015
[11] Applications of Genetic Algorithms in Cryptology
Proceedings of the Third International Conference on Soft Computing for Problem Solving. Springer India, 2014
[12] Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits
E-Business and Telecommunications, 2014
[13] On the origin of yet another channel
Security Protocols XXI, 2013
[14] Towards cryptographic function distinguishers with evolutionary circuits
10th International Conference on Security and Cryptography, Laboratory of Security and Applied Cryptography, Masaryk University, 2013
[15] The Evolution of Randomess Testing
2013
[16] An evolutionary computation attack on one-round TEA
Procedia Computer Science, 2011
[17] Infocommunications

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.