Sagnik Dutta

Work place: Department of Computer Science and Technology, Indian Institute of Engineering Science and Technology, Shibpur, Howrah, 711103, India

E-mail: sagnikofficial001@gmail.com

Website:

Research Interests:

Biography

Sagnik Dutta is currently pursuing his B. Tech. degree in Computer Science and Technology at the Indian Institute of Engineering Science and Technology, Shibpur, India. Sagnik has demonstrated proficiency in a diverse range of programming languages and frameworks. He has worked on notable projects, such as the development of a Face Recognition GUI for an attendance system and the creation of 'BooksReading,' a comprehensive website for book enthusiasts. Additionally, he showcased his technical prowess by crafting a Chrome extension, 'Video Teacher,' designed to summarize lengthy YouTube videos. Sagnik's dedication extends beyond academics, as exemplified by his insightful Cryptographic Analysis Internship, where he delved into encryption algorithms and key management protocols. 

Author Articles
On Cryptanalysis of 3-DES using Nature-Inspired Algorithms

By Subinoy Sikdar Sagnik Dutta Malay Kule

DOI: https://doi.org/10.5815/ijcnis.2025.03.04, Pub. Date: 8 Jun. 2025

This paper presents a novel cryptanalysis method of DES (2-DES and 3-DES) using nature-inspired algorithms; namely Cuckoo Search Algorithm and Grey Wolf Optimization Algorithm. We have shown the loophole of 2-DES and 3-DES encryption systems and discovered the vulnerabilities by some simple mathematical calculations. The Meet-In-The-Middle approach can be executed on 2-DES along with Known Plaintext Attack, Chosen Plaintext Attack, and Chosen Ciphertext Attack. The valid key pairs along with the original key pairs can successfully be recovered by this attack algorithm. But in the Ciphertext Only Attack, the Meet-In-The-Middle approach fails to recover the plaintext as well as the valid key pairs both for 2-DES and 3-DES. To overcome this problem, we have proposed a novel cryptanalysis method of 3-DES with Ciphertext Only Attack using Cuckoo Search Algorithm and Grey Wolf Optimization Algorithm (GWO). We have developed a suitable fitness function, accelerating the algorithm toward the optimal solution. This paper shows how CSA and GWO can break a 3-DES cryptosystem using a Ciphertext Only Attack. This proposed cryptanalysis method can also be applied to any round of DES.

[...] Read more.
Other Articles