Development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solving
Introduction. The research area of “natural calculation” is now widely used for the solution to optimization NP-complete problems including combinatorial tasks of cryptanalysis. A quick overview of the publications devoted to the application of the natural (bioinspired) methods for cryptanalysis is...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | Russian |
Published: |
Don State Technical University
2017-03-01
|
Series: | Advanced Engineering Research |
Subjects: | |
Online Access: | https://www.vestnik-donstu.ru/jour/article/view/256 |
id |
doaj-aae3ee659f1a4b9abbff18010ade700e |
---|---|
record_format |
Article |
spelling |
doaj-aae3ee659f1a4b9abbff18010ade700e2021-10-02T18:37:04ZrusDon State Technical UniversityAdvanced Engineering Research2687-16532017-03-0117114415910.23947/1992-5980-2017-17-1-144-159256Development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solvingYury O Chernyshev0Alexander S Sergeev1Alexander N Ryazanov2Evgeny O. Dubrov3Don State Technical UniversityDon State Technical University“711 Voenproekt” JSCRostov Scientific Research Institute for RadiocommunicationIntroduction. The research area of “natural calculation” is now widely used for the solution to optimization NP-complete problems including combinatorial tasks of cryptanalysis. A quick overview of the publications devoted to the application of the natural (bioinspired) methods for cryptanalysis is provided. The main work objective is to investigate a possibility of applying bee colony algorithms to the realization of block cipher cryptanalysis. Materials and Methods . The known bee colony techniques belonging to a relatively new class of the bioinspired optimization methods that simulate the processes occurring in wildlife are applied to solve this optimization problem. The description and the block diagram of the bee colony algorithm for the solution to a cryptanalysis task are provided; basic operations performed in parallel at the global level are noted. In the following, a set of independent operators allowing for the concurrent execution is defined. For this purpose, information-logical flowgraphs of the algorithm with the input control and information links are built, as well as matrices of succession, logical incompatibility, and independence are formed. This matrix of independence allows the definition of a set of algorithm operators admitting parallel execution. At that, the dimensionality of the maximal internally stable sets defines the maximum number of the processors used for the algorithm implementation. Research Results . Theoretical estimates of time complexity of the bee colony algorithm are given as the key data. Besides, the problem solution is provided: to find the required smallest number of processors of the homogeneous parallel computing systems with distributed memory, and a uniform plan for the implementation of operators for them, for the cryptanalysis algorithm based on the constructed information-logical graph data-logical graph, and for the preset time. The assessment of the wanted smallest number of processors for the cryptanalysis algorithm implementation, and the evaluation of the total time of the algorithm realization are given. Discussion and Conclusions. The basic research results are: the development of the bee colony algorithm used for the cryptanalysis task solution; the description of its flowchart and the principal par-allel executed stages; the construction of a matrix of independence; the evaluation of the number of processors for the algorithm imple-mentation. It should be noted (and it was observed in the previous works) that the distinctive feature of applying the bioinspired meth-ods of cryptanalysis is the applicability of the encryption-decryption algorithm as a criterion function for the evaluation of the key ac-ceptability defined by the bioinspired method operations. Thus, it can be affirmed that when using the bioinspired methods, the secret key definition process depends not so much on the complexity of the encryption transformations, as on the bioinspired method itself which should provide a sufficient diversity of the key generationhttps://www.vestnik-donstu.ru/jour/article/view/256криптоанализпчелиный алгоритмпчелы-фуражирыпчелы-разведчикиинформационно-логический графматрица независимостиcryptanalysisbee colony algorithmbee foragersscout beesinformation-logical graphmatrix of independence |
collection |
DOAJ |
language |
Russian |
format |
Article |
sources |
DOAJ |
author |
Yury O Chernyshev Alexander S Sergeev Alexander N Ryazanov Evgeny O. Dubrov |
spellingShingle |
Yury O Chernyshev Alexander S Sergeev Alexander N Ryazanov Evgeny O. Dubrov Development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solving Advanced Engineering Research криптоанализ пчелиный алгоритм пчелы-фуражиры пчелы-разведчики информационно-логический граф матрица независимости cryptanalysis bee colony algorithm bee foragers scout bees information-logical graph matrix of independence |
author_facet |
Yury O Chernyshev Alexander S Sergeev Alexander N Ryazanov Evgeny O. Dubrov |
author_sort |
Yury O Chernyshev |
title |
Development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solving |
title_short |
Development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solving |
title_full |
Development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solving |
title_fullStr |
Development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solving |
title_full_unstemmed |
Development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solving |
title_sort |
development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solving |
publisher |
Don State Technical University |
series |
Advanced Engineering Research |
issn |
2687-1653 |
publishDate |
2017-03-01 |
description |
Introduction. The research area of “natural calculation” is now widely used for the solution to optimization NP-complete problems including combinatorial tasks of cryptanalysis. A quick overview of the publications devoted to the application of the natural (bioinspired) methods for cryptanalysis is provided. The main work objective is to investigate a possibility of applying bee colony algorithms to the realization of block cipher cryptanalysis. Materials and Methods . The known bee colony techniques belonging to a relatively new class of the bioinspired optimization methods that simulate the processes occurring in wildlife are applied to solve this optimization problem. The description and the block diagram of the bee colony algorithm for the solution to a cryptanalysis task are provided; basic operations performed in parallel at the global level are noted. In the following, a set of independent operators allowing for the concurrent execution is defined. For this purpose, information-logical flowgraphs of the algorithm with the input control and information links are built, as well as matrices of succession, logical incompatibility, and independence are formed. This matrix of independence allows the definition of a set of algorithm operators admitting parallel execution. At that, the dimensionality of the maximal internally stable sets defines the maximum number of the processors used for the algorithm implementation. Research Results . Theoretical estimates of time complexity of the bee colony algorithm are given as the key data. Besides, the problem solution is provided: to find the required smallest number of processors of the homogeneous parallel computing systems with distributed memory, and a uniform plan for the implementation of operators for them, for the cryptanalysis algorithm based on the constructed information-logical graph data-logical graph, and for the preset time. The assessment of the wanted smallest number of processors for the cryptanalysis algorithm implementation, and the evaluation of the total time of the algorithm realization are given. Discussion and Conclusions. The basic research results are: the development of the bee colony algorithm used for the cryptanalysis task solution; the description of its flowchart and the principal par-allel executed stages; the construction of a matrix of independence; the evaluation of the number of processors for the algorithm imple-mentation. It should be noted (and it was observed in the previous works) that the distinctive feature of applying the bioinspired meth-ods of cryptanalysis is the applicability of the encryption-decryption algorithm as a criterion function for the evaluation of the key ac-ceptability defined by the bioinspired method operations. Thus, it can be affirmed that when using the bioinspired methods, the secret key definition process depends not so much on the complexity of the encryption transformations, as on the bioinspired method itself which should provide a sufficient diversity of the key generation |
topic |
криптоанализ пчелиный алгоритм пчелы-фуражиры пчелы-разведчики информационно-логический граф матрица независимости cryptanalysis bee colony algorithm bee foragers scout bees information-logical graph matrix of independence |
url |
https://www.vestnik-donstu.ru/jour/article/view/256 |
work_keys_str_mv |
AT yuryochernyshev developmentandinvestigationofparallelmodelofbeecolonyalgorithmsforcryptanalysisproblemsolving AT alexanderssergeev developmentandinvestigationofparallelmodelofbeecolonyalgorithmsforcryptanalysisproblemsolving AT alexandernryazanov developmentandinvestigationofparallelmodelofbeecolonyalgorithmsforcryptanalysisproblemsolving AT evgenyodubrov developmentandinvestigationofparallelmodelofbeecolonyalgorithmsforcryptanalysisproblemsolving |
_version_ |
1716848893915824128 |