Cryptanalysis of the RC4 Stream Cipher using Evolutionary ...
Cryptanalysis of the RC4 Stream Cipher using Evolutionary ...
Cryptanalysis of the RC4 Stream Cipher using Evolutionary ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
2.3 Genetic Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13<br />
2.3.1 Chromosome Representation . . . . . . . . . . . . . . . . . . . . . . 16<br />
2.3.2 Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16<br />
2.3.3 Crossover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17<br />
2.3.4 Mutation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18<br />
2.4 Particle Swarm Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . 19<br />
2.4.1 Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19<br />
2.4.2 Particle Representation . . . . . . . . . . . . . . . . . . . . . . . . . 21<br />
3 Literature Review 22<br />
3.1 Review <strong>of</strong> <strong>RC4</strong> Literature . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22<br />
3.1.1 Successful <strong>Cryptanalysis</strong> <strong>of</strong> <strong>RC4</strong> . . . . . . . . . . . . . . . . . . . . 23<br />
3.1.2 O<strong>the</strong>r Methods for <strong>Cryptanalysis</strong> <strong>of</strong> <strong>RC4</strong> . . . . . . . . . . . . . . . 25<br />
3.2 Review <strong>of</strong> <strong>Evolutionary</strong> Algorithms Literature . . . . . . . . . . . . . . . . . 28<br />
3.2.1 <strong>Cryptanalysis</strong> Using Genetic Algorithms . . . . . . . . . . . . . . . . 28<br />
3.2.2 <strong>Cryptanalysis</strong> Using Particle Swarm Optimization . . . . . . . . . . 30<br />
4 Methodology 32<br />
4.1 Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33<br />
4.2 Assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34<br />
v