remah

logo

European Development  And Research Academy (EDARA)

    Tuesday, 28 November 2023 06:52

    Attack of AES Ciphertext by using innovated Heuristic Model Based on Strawberry Algorithm

    Written by Haifa Mansour Hussein ,Adel A. Abed_Al Wahab,Prof Dr. Ghassan Ezzulddin
    (0 votes)
    Share:
    Share:

    Attack of AES Ciphertext by using innovated Heuristic Model Based on Strawberry Algorithm

    Haifa Mansour Hussein University of Tikrit, College of education ,
    Adel A. Abed_Al Wahab, University of Diyala ,College of pure science education, Prof Dr. Ghassan Ezzulddin ArifUniversity of Tikrit, College of Education

     

     ABSTRACT
    With the development of cyber security and the emergence of an urgent need to access information in any way, even if it is not authorized in various conflicts between countries, the importance of research in the field of attacking the secure texts has emerged remarkably recently. Meta-heuristic(MH) algorithms are a kind of adaptive algorithms to solve a wide range of optimization problems that are difficult to solve using traditional methods, which have proven highly effective in this domain, including the problems of attacking encrypted texts and breaking them in a reasonable time. This paper will proposed a new approach based on strawberry Algorithm(SA)for attacking the AES cipher texts to find the encryption key. The traditional algorithms used to attack the ciphers encrypted with different encryption methods suffer from their lack of intelligence to reach the plain text in a reasonable time. Therefore, this paper aims to achieve two goals, the first goal is to design an approach based on the strawberry algorithm to attack encrypted texts using the AES algorithm, and the second goal is to measure the effectiveness of the proposed approach compared to other attacking methods. The proposed approach comprises four phases; initialize the population of virtual AES encryption key using randomly manner, creating both of key, best array, search to find the encryption key elements using an adaptive strawberry algorithm and finally, measuring the proposed approach effectiveness in comparing to other attacking methods. The results showed a remarkable progress for proposed search algorithm compared to other cipher-breaking methods in terms of the time taken to break the cipher and access the plain text by 60%. The use of unconventional and intelligent methods achieves satisfactory results in acceptable and reasonable time.
    Keyword:- Encryption, Plaintext, Ciphertext, Heuristic, strawberry, cryptanalysis.

    Download Paper

    Read 736 times