Journal of Theoretical and Applied Information Technology © 2005 - 2009 JATIT. All rights reserved. www.jatit.org 387 GENETIC ALGORITHMS, TABU SEARCH AND SIMULATED ANNEALING: A COMPARISON BETWEEN THREE APPROACHES FOR THE CRYPTANALYSIS OF TRANSPOSITION CIPHER POONAM GARG Institute of Management Technology, INDIA E-mail: pgarg@imt.edu ABSTRACT: Due to increasing incidents of cyber attacks, the demand for effective internet security is increasing. Cryptology is the science and study of systems for secret communication. It consists of two complementary fields of study: cryptography and cryptanalysis. In this paper, we propose a cryptanalysis method based on genetic algorithm, tabu search & simulated annealing to break a transposition cipher. We will also compare and analyze the performance of these algorithms in automated attacks on a transposition cipher. A generalized version of these algorithms can be used for attacking other cipher as well. Keywords: Transposition Cipher, Genetic Algorithm, Tabu Search, Simulated Annealing, Key search. 1. INTRODUCTION The demand for effective internet security is increasing exponentially day by day. Businesses have an obligation to protect sensitive data from loss or theft. Such sensitive data can be potentially damaging if it is altered, destroyed, or if it falls into the wrong hands. So they need to develop a scheme that guarantees to protect the information from the attacker. Cryptology is at the heart of providing such guarantee. Cryptology is the science of building and analyzing different encryption and decryption methods. Cryptology consists of two subfields; Cryptography & Cryptanalysis. Cryptography is the science of building new powerful and efficient encryption and decryption methods. It deals with the techniques for conveying information securely. The basic aim of cryptography is to allow the intended recipients of a message to receive the message properly while preventing eavesdroppers from understanding the message. Cryptanalysis is the science and study of method of breaking cryptographic techniques i.e. ciphers. In other words it can be described as the process of searching for flaws or oversights in the design of ciphers. Classical ciphers fall into one of the two broad categories: substitution cipher & transposition cipher. Modern crypto-systems have now supplanted the classical ciphers but cryptanalysis of classical ciphers is most popular crypto logical application for meta-heuristic search research. The basic concepts of substitution and transposition are still widely used today in the Advanced Encryption Standard(AES). Advanced Encryption Standards(AES) & International Data Encryption Algorithm (IDEA) are widely used encryption algorithm which use only three very simple operators, namely substitution, permutation(transposition) and bit-wise exclusive- OR operator. Since the operations of the classical cipher are the building blocks of modern ciphers, so the classical ciphers are usually the first ones considered when researching new attacks. Transposition cipher simply performs some permutation over the plain text alphabet. Transposition cipher works by breaking a message into fixed size blocks, and then permuting the characters within each block according to a fixed permutation; say the key to the transposition cipher is simply the permutation . The transposition cipher has the property that the encrypted message (i.e., the ciphertext) contains all the characters that were in the plaintext message, albeit in a different (and hopefully meaningless) order. Example of the transposition cipher is presented in Table 1.