On Cryptanalysis of 3-DES using Nature-Inspired Algorithms

PDF (1057KB), PP.54-71

Views: 0 Downloads: 0

Author(s)

Subinoy Sikdar 1,* Sagnik Dutta 1 Malay Kule 1

1. Department of Computer Science and Technology, Indian Institute of Engineering Science and Technology, Shibpur, Howrah, 711103, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2025.03.04

Received: 30 Nov. 2023 / Revised: 8 Mar. 2024 / Accepted: 28 Mar. 2025 / Published: 8 Jun. 2025

Index Terms

Cryptanalysis, DES, Meet-In-The-Middle, Cuckoo Search Algorithm, Grey Wolf Optimization, Fitness Function

Abstract

This paper presents a novel cryptanalysis method of DES (2-DES and 3-DES) using nature-inspired algorithms; namely Cuckoo Search Algorithm and Grey Wolf Optimization Algorithm. We have shown the loophole of 2-DES and 3-DES encryption systems and discovered the vulnerabilities by some simple mathematical calculations. The Meet-In-The-Middle approach can be executed on 2-DES along with Known Plaintext Attack, Chosen Plaintext Attack, and Chosen Ciphertext Attack. The valid key pairs along with the original key pairs can successfully be recovered by this attack algorithm. But in the Ciphertext Only Attack, the Meet-In-The-Middle approach fails to recover the plaintext as well as the valid key pairs both for 2-DES and 3-DES. To overcome this problem, we have proposed a novel cryptanalysis method of 3-DES with Ciphertext Only Attack using Cuckoo Search Algorithm and Grey Wolf Optimization Algorithm (GWO). We have developed a suitable fitness function, accelerating the algorithm toward the optimal solution. This paper shows how CSA and GWO can break a 3-DES cryptosystem using a Ciphertext Only Attack. This proposed cryptanalysis method can also be applied to any round of DES.

Cite This Paper

Subinoy Sikdar, Sagnik Dutta, Malay Kule, "On Cryptanalysis of 3-DES using Nature-Inspired Algorithms", International Journal of Computer Network and Information Security(IJCNIS), Vol.17, No.3, pp.54-71, 2025. DOI:10.5815/ijcnis.2025.03.04

Reference

[1]Forouzan. B.A., “Cryptography and Network Security”, Tata McGraw-Hill, New Delhi (2007).
[2]Atul Kahate, “Cryptography and Network Security”, McGraw Hill Education (India) Private Limited.
[3]William Stallings, “Cryptography and Network Security: Principle and Practice”, Pearson.
[4]M.V. Arun Kumar, “Network Security”, Laxmi Publications.
[5]Ajay Raj Parashar, Deepti Mittal, “Cryptography and Network Security”, Laxmi Publications.
[6]Bernard Menenzes, “Network Security and Cryptography”, Thomson Press (India) Ltd.
[7]Express Learning - Cryptography and Network Security (ITL Education Solutions Limited), Pearson Education India.
[8]R. Kamal, M. Bag, M. Kule, “On the Cryptanalysis of S-DES Using Binary Cuckoo Search Algorithm”, Computational Intelligence in Pattern Recognition, vol. 999, pp. 23-32, 2020. DOI:10.1007/978-981-13-9042-5_3
[9]M. Matsui, “Linear Cryptanalysis Method for DES Cipher”, In Workshop on the Theory and Application of of Cryptographic Techniques, vol. 765, pp. 386-397, 1993. DOI: 10.1007/3-540-48285-7_33
[10]E. Biham, A. Shamir, “Differential Cryptanalysis of the Full 16-round DES”, In Advances in Cryptology—CRYPTO’92: 12th Annual International Cryptology Conference Santa Barbara, California, vol. 740, pp. 487-496, 1993. DOI: 10.1007/3-540-48071-4_34
[11]E. Biham, A. Shamir, “Differential cryptanalysis of DES-like cryptosystems”, Journal of Cryptology, vol. 4, pp. 3–72, 1991. DOI: 10.1007/BF00630563
[12]X. S. Yang and S. Deb, "Cuckoo Search via Lévy flights", World Congress on Nature & Biologically Inspired Computing(NaBIC), pp. 210-214, 2009. DOI: 10.1109/NABIC.2009.5393690
[13]L. Jiao, R. Shang, F. Liu, W. Zhang, “Brain and Nature-Inspired Learning Computation and Recognition”, Elsevier, pp. 127-195, ISBN 9780128197950, 2020.
[14]Mirjalili Seyedali, Seyed Mohammad Mirjalili, and Andrew Lewis, "Grey wolf optimizer", Advances in engineering software, vol. 69, pp. 46-61, 2014. DOI: 10.1016/j.advengsoft.2013.12.007
[15]Abdoun Otman, Jaafar Abouchabaka, and Chakir Tajani, "Analyzing the performance of mutation operators to solve the traveling salesman problem", International Journal of Emerging Sciences, vol. 2(1), pp. 61-77, 2012. DOI: 10.48550/arXiv.1203.3099
[16]Grari, Hicham, Ahmed Azouaoui, and Khalid Zine-Dine, "Ant colony optimization for cryptanalysis of simplified-DES", Advanced Intelligent Systems Applied to Energy, vol. 912, pp. 111-121, 2019. DOI: 10.1007/978-3-030-12065-8_11
[17]Abd-Elmonim, Wafaa G., Neveen I. Ghali, Aboul Ella Hassanien, and Ajith Abraham, "Known-plaintext attack of DES-16 using Particle Swarm Optimization", Third World Congress on Nature and Biologically Inspired Computing, pp. 12-16, 2011. DOI: 10.1109/NaBIC.2011.6089410
[18]Kamal Ritwiz, Moynak Bag, and Malay Kule, "On the cryptanalysis of S-DES using nature-inspired optimization algorithms", Evolutionary Intelligence, vol. 14, pp. 163-173, 2021. DOI: 10.1007/s12065-020-00417-5
[19]Tiwari Vikas, Ajeet Singh, and Appala Naidu Tentu, "Differential cryptanalysis on DES cryptosystem up to eight rounds", International Journal of Information Privacy, Security and Integrity, vol. 4(1), pp. 1-29, 2019. DOI: 10.1504/IJIPSI.2019.103560
[20]Amic Seeven, KM Sunjiv Soyjaudah, Heman Mohabeer, and Gianeshwar Ramsawock, "Cryptanalysis of DES-16 using binary firefly algorithm", IEEE International Conference on Emerging Technologies and Innovative Business Practices for the Transformation of Societies (EmergiTech), pp. 94-99, 2016. DOI: 10.1109/EmergiTech.2016.7737318
[21]Tezcan Cihangir, "Key lengths revisited: GPU-based brute force cryptanalysis of DES, 3DES, and PRESENT", Journal of   Systems Architecture, vol. 124, 102402, 2022. DOI: 10.1016/j.sysarc.2022.102402
[22]A.F. Kamaruzaman, A.M. Zain, S.M. Yusuf, A. Udin, “Levy Flight Algorithm for Optimization Problems - A Literature Review”, Applied mechanics and materials, vol. 421, pp. 496–501, 2013. DOI: 10.4028/www.scientific.net/AMM.421.496
[23]Y. Liu and B. Cao, "A Novel Ant Colony Optimization Algorithm With Levy Flight", IEEE Access, vol. 8, pp. 67205-67213, 2020. DOI: 10.1109/ACCESS.2020.2985498
[24]S. Roy and S. Sinha Chaudhuri, "Cuckoo search algorithm using Lévy flight: a review", International Journal of Modern Education and Computer Science, vol. 12, pp. 10-15, 2013. DOI: 10.5815/ijmecs.2013.12.02
[25]M.A. Gutiérrez, S. Krenk, “Stochastic Finite Element Methods”, Encyclopedia of Computational Mechanics Second Edition, pp. 1-25, 2018. DOI: 10.1002/9781119176817.ecm2044
[26]Carl M. Bender, “Perturbation Theory in large order”, Advances in Mathematics, vol. 30, pp. 250-267, 1978. DOI: 10.1016/0001-8708(78)90039-7