Development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solving

Introduction. The research area of “natural calculation” is now widely used for the solution to optimization NP-complete problems including combinatorial tasks of cryptanalysis. A quick overview of the publications devoted to the application of the natural (bioinspired) methods for cryptanalysis is...

Full description

Bibliographic Details
Main Authors: Yury O Chernyshev, Alexander S Sergeev, Alexander N Ryazanov, Evgeny O. Dubrov
Format: Article
Language:Russian
Published: Don State Technical University 2017-03-01
Series:Advanced Engineering Research
Subjects:
Online Access:https://www.vestnik-donstu.ru/jour/article/view/256
id doaj-aae3ee659f1a4b9abbff18010ade700e
record_format Article
spelling doaj-aae3ee659f1a4b9abbff18010ade700e2021-10-02T18:37:04ZrusDon State Technical UniversityAdvanced Engineering Research2687-16532017-03-0117114415910.23947/1992-5980-2017-17-1-144-159256Development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solvingYury O Chernyshev0Alexander S Sergeev1Alexander N Ryazanov2Evgeny O. Dubrov3Don State Technical UniversityDon State Technical University“711 Voenproekt” JSCRostov Scientific Research Institute for RadiocommunicationIntroduction. The research area of “natural calculation” is now widely used for the solution to optimization NP-complete problems including combinatorial tasks of cryptanalysis. A quick overview of the publications devoted to the application of the natural (bioinspired) methods for cryptanalysis is provided. The main work objective is to investigate a possibility of applying bee colony algorithms to the realization of block cipher cryptanalysis. Materials and Methods . The known bee colony techniques belonging to a relatively new class of the bioinspired optimization methods that simulate the processes occurring in wildlife are applied to solve this optimization problem. The description and the block diagram of the bee colony algorithm for the solution to a cryptanalysis task are provided; basic operations performed in parallel at the global level are noted. In the following, a set of independent operators allowing for the concurrent execution is defined. For this purpose, information-logical flowgraphs of the algorithm with the input control and information links are built, as well as matrices of succession, logical incompatibility, and independence are formed. This matrix of independence allows the definition of a set of algorithm operators admitting parallel execution. At that, the dimensionality of the maximal internally stable sets defines the maximum number of the processors used for the algorithm implementation. Research Results . Theoretical estimates of time complexity of the bee colony algorithm are given as the key data. Besides, the problem solution is provided: to find the required smallest number of processors of the homogeneous parallel computing systems with distributed memory, and a uniform plan for the implementation of operators for them, for the cryptanalysis algorithm based on the constructed information-logical graph data-logical graph, and for the preset time. The assessment of the wanted smallest number of processors for the cryptanalysis algorithm implementation, and the evaluation of the total time of the algorithm realization are given. Discussion and Conclusions. The basic research results are: the development of the bee colony algorithm used for the cryptanalysis task solution; the description of its flowchart and the principal par-allel executed stages; the construction of a matrix of independence; the evaluation of the number of processors for the algorithm imple-mentation. It should be noted (and it was observed in the previous works) that the distinctive feature of applying the bioinspired meth-ods of cryptanalysis is the applicability of the encryption-decryption algorithm as a criterion function for the evaluation of the key ac-ceptability defined by the bioinspired method operations. Thus, it can be affirmed that when using the bioinspired methods, the secret key definition process depends not so much on the complexity of the encryption transformations, as on the bioinspired method itself which should provide a sufficient diversity of the key generationhttps://www.vestnik-donstu.ru/jour/article/view/256криптоанализпчелиный алгоритмпчелы-фуражирыпчелы-разведчикиинформационно-логический графматрица независимостиcryptanalysisbee colony algorithmbee foragersscout beesinformation-logical graphmatrix of independence
collection DOAJ
language Russian
format Article
sources DOAJ
author Yury O Chernyshev
Alexander S Sergeev
Alexander N Ryazanov
Evgeny O. Dubrov
spellingShingle Yury O Chernyshev
Alexander S Sergeev
Alexander N Ryazanov
Evgeny O. Dubrov
Development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solving
Advanced Engineering Research
криптоанализ
пчелиный алгоритм
пчелы-фуражиры
пчелы-разведчики
информационно-логический граф
матрица независимости
cryptanalysis
bee colony algorithm
bee foragers
scout bees
information-logical graph
matrix of independence
author_facet Yury O Chernyshev
Alexander S Sergeev
Alexander N Ryazanov
Evgeny O. Dubrov
author_sort Yury O Chernyshev
title Development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solving
title_short Development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solving
title_full Development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solving
title_fullStr Development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solving
title_full_unstemmed Development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solving
title_sort development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solving
publisher Don State Technical University
series Advanced Engineering Research
issn 2687-1653
publishDate 2017-03-01
description Introduction. The research area of “natural calculation” is now widely used for the solution to optimization NP-complete problems including combinatorial tasks of cryptanalysis. A quick overview of the publications devoted to the application of the natural (bioinspired) methods for cryptanalysis is provided. The main work objective is to investigate a possibility of applying bee colony algorithms to the realization of block cipher cryptanalysis. Materials and Methods . The known bee colony techniques belonging to a relatively new class of the bioinspired optimization methods that simulate the processes occurring in wildlife are applied to solve this optimization problem. The description and the block diagram of the bee colony algorithm for the solution to a cryptanalysis task are provided; basic operations performed in parallel at the global level are noted. In the following, a set of independent operators allowing for the concurrent execution is defined. For this purpose, information-logical flowgraphs of the algorithm with the input control and information links are built, as well as matrices of succession, logical incompatibility, and independence are formed. This matrix of independence allows the definition of a set of algorithm operators admitting parallel execution. At that, the dimensionality of the maximal internally stable sets defines the maximum number of the processors used for the algorithm implementation. Research Results . Theoretical estimates of time complexity of the bee colony algorithm are given as the key data. Besides, the problem solution is provided: to find the required smallest number of processors of the homogeneous parallel computing systems with distributed memory, and a uniform plan for the implementation of operators for them, for the cryptanalysis algorithm based on the constructed information-logical graph data-logical graph, and for the preset time. The assessment of the wanted smallest number of processors for the cryptanalysis algorithm implementation, and the evaluation of the total time of the algorithm realization are given. Discussion and Conclusions. The basic research results are: the development of the bee colony algorithm used for the cryptanalysis task solution; the description of its flowchart and the principal par-allel executed stages; the construction of a matrix of independence; the evaluation of the number of processors for the algorithm imple-mentation. It should be noted (and it was observed in the previous works) that the distinctive feature of applying the bioinspired meth-ods of cryptanalysis is the applicability of the encryption-decryption algorithm as a criterion function for the evaluation of the key ac-ceptability defined by the bioinspired method operations. Thus, it can be affirmed that when using the bioinspired methods, the secret key definition process depends not so much on the complexity of the encryption transformations, as on the bioinspired method itself which should provide a sufficient diversity of the key generation
topic криптоанализ
пчелиный алгоритм
пчелы-фуражиры
пчелы-разведчики
информационно-логический граф
матрица независимости
cryptanalysis
bee colony algorithm
bee foragers
scout bees
information-logical graph
matrix of independence
url https://www.vestnik-donstu.ru/jour/article/view/256
work_keys_str_mv AT yuryochernyshev developmentandinvestigationofparallelmodelofbeecolonyalgorithmsforcryptanalysisproblemsolving
AT alexanderssergeev developmentandinvestigationofparallelmodelofbeecolonyalgorithmsforcryptanalysisproblemsolving
AT alexandernryazanov developmentandinvestigationofparallelmodelofbeecolonyalgorithmsforcryptanalysisproblemsolving
AT evgenyodubrov developmentandinvestigationofparallelmodelofbeecolonyalgorithmsforcryptanalysisproblemsolving
_version_ 1716848893915824128