Bibliothèque de cryptanalyse
Déclassifiés
Articles
- Fredrik Almgren et al., How We Cracked
the Code Book Ciphers, November 1, 2000
- Philip J. Aston, Decoding
a war time diary, 1997
- Christophe Bidan, Cryptographie et cryptanalyse
- William et Elizebeth Friedman, Methods for the solution of ciphers, Riverbank
publications 15-22
- Kevin Knight, Beáta Megyesi and Christiane Schaefer, The
Copiale Cipher, Proceedings of the 4th Workshop on Building and Using
Comparable Corpora, pages 29, 2011
- Shujun Li, Xuan Zheng, Cryptanalysis of a
chaotic image encryption method, 2002 (?)
- Jean-Louis Morel (alias Rossignol), Le
cryptographe cylindrique du Commandant Bazeries, 2017
- Edwin Olson, Robust Dictionary Attack of
Short Simple Substitution Ciphers, 2007
- Sujith Ravi and Kevin Knight, Bayesian
Inference for Zodiac and other Homophonic Ciphers, Proceedings of the
49th Annual Meeting of the Association for Computational Linguistics, pages
239247, 2011
- Marian Rejewski, An Application of the Theory
of Permutations in Breaking the Enigma Cipher, Applicaciones Mathematicae.
16, No. 4, Warsaw 1980
Thèses / Maîtrises
- Nada Aldarrab, Decipherment of historical
manuscript, 2017
- Elodie Etienne, Elementary
statistical methods of cryptography, Université de Liège,
2019
- Pascal Junod, Linear Cryptanalysis of DES,
Thèse EPFL, 2000
- Issa Lompo et al., Décryptage du chiffrement
de Vigenère, les faiblesses du chiffre carré
- Tahar Mekhaznia, Analyse cryptographique
par les méthodes heuristiques, 2014?
- Guannan Zhong, Cryptanalysis of Homophonic Substitution
Cipher Using Hidden Markov Models, 2016
Métaheuristiques
Généralités
- Didier Müller, Les
métaheuristiques en cryptanalyse, Bulletin de la SSPMP, Numéro
143, Mai 2020
- George Lasry, A methodology for the cryptanalysis
of classical ciphers with search metaheuristics, Kassel University press,
2018
- George Lasry, Modern
Cryptanalysis of Historical Ciphers, November 1, 2019
- Poonam Garg, Genetic algorithms, tabu search
and simulated annealing: a comparison between three approaches for the cryptanalysis
of transposition cipher, Journal of Theoretical and Applied Information
Technology
- Poonam Garg, Evolutionary
Computation Algorithms for Cryptanalysis: A Study, International Journal
of Computer Science and Information Security, Vol. 7, No. 1, 2010
- Jeffrey Yi, Cryptanalysis
of Homophonic Substitution-Transposition Cipher, 2014
- Eugen Antal et al., Cryptanalysis
of the columnar transposition using metaheuristics, 2019
- Eugen Antal et al., Evolutionary
computation in cryptanalysis of classical ciphers, Tatra Mt. Math. Publ.
70 (2017), 179197
- P. Saveetha, Dr. S. Arumugam, K. Kiruthikadevi, Cryptography
and the Optimization Heuristics Techniques, International Journal of Advanced
Research in Computer Science and Software Engineering, Volume 4, Issue 10,
October 2014
- Ho Yean Li, Azman Samsudin, and Bahari, Heuristic
Cryptanalysis of Classical and Modern Ciphers, Conference Paper ·
December 2005
- S. Picek, M. Golub, On
Evolutionary Computation Methods in Cryptography, 2011 ?
Méthode de Monte Carlo
Hill Climbing
- R. W. Bean, G. Lasry and F. Weierud, Eavesdropping
on the Biafra-Lisbon Link - Breaking Historical Ciphers from the Biafran War,
2020
- R. W. Bean, The Use of Project Gutenberg
and Hexagram Statistics to Help Solve Famous Unsolved Ciphers, Proceedings
of the 3rd International Conference on Historical Cryptology, HistoCrypt 2020,
pp. 31-35
- Luka Bulatovic et al., Automated
cryptanalysis of substitution cipher using hill climbing with well designed
heuristic function, Mathematica Montisnigri, vol XLIV, 2019
- Michael J. Cowan, Churn algorithm,
2015
- Amrapali Dhavare, Richard M. Lowy, Mark Stamp, Efficient
Cryptanalysis of Homophonic Substitution Ciphers, ?
- Sam Hasinoff, Solving Substitution
Ciphers
Recuit simulé
- Jean-Louis Morel (alias Rossignol), Décrypter
une substitution monalphabétique, 2015
- Nils Kopal, Cryptanalysis
of Homophonic Substitution Ciphers Using Simulated Annealing with Fixed Temperature,
Proceedings of the 2nd International Conference on Historical Cryptology,
pages 107-116
Mons, Belgium, 23-26 June, 2019
- George Lasry, Solving a 40-Letter
Playfair Challenge with CrypTool 2, Proceedings of the 2nd International
Conference on Historical Cryptology, pages 87-96, Mons, Belgium, 23-26 June,
2019
Algorithmes génétiques
- G. Negara, An Evolutionary
Approach for the Playfair Cipher Cryptanalysis
- Ragheb Toemeh, Subbanagounder Arumugam, Applying
Genetic Algorithms for Searching Key-Space of Polyalphabetic Substitution
Ciphers, The International Arab Journal of Information Technology, Vol.
5, No. 1, January 2008
- Dalal Abdulmohsin Hammood, Breaking
A Playfair Cipher Using Memetic Algorithm, Journal of Engineering and Development,
Vol. 17, No.5, November 2013 , ISSN 1813- 7822
- Ali S. Alkhalid, Alaa O Alkhfagi, Cryptanalysis
of ADFGX using Genetic Algorithm, International Journal of Computing,
Communications & Instrumentation Engg. (IJCCIE) Vol. 3, Issue 1 (2016)
ISSN 2349-1469 EISSN 2349-1477
- Ashish, Rajat Kumar, Finding
the best key for playfair cipher by using genetic algorithm, International
Journal of Advance Research in Science and Engineering, Volume 7, Special
Issue No 3, January 2018
- A. K. Verma, Mayank Dave and R. C. Joshi, Genetic
Algorithm and Tabu Search Attack on the Mono-Alphabetic Subsitution Cipher
in Adhoc Networks, Journal of Computer Science 3 (3): 134-137, 2007
- Ms. Pooja A. Bagane, Dr. Kshama V. Kulhalli, Genetic
Algorithm for Cryptography: A Review, International Journal of Computer
Application Issue 5, Volume 1 (Jan.- Feb. 2015)
- Bethany Delman, Genetic
Algorithms in Cryptography, thesis, 2004
- A. J. Bagnall, The Applications of Genetic
Algorithms in Cryptanalysis, thesis, 1996
- Zurab Kochladze, Giorgi Gelashvili, Using
Genetic Algorithm for the Breaking Vigenere Cipher, GESJ: Computer Science
and Telecommunications 2017|No.2(52)
- S. S. Omran, A. S. Al-Khalid, D. M. Al-Saady, A
Cryptanalytic Attack on Vigenère Cipher Using Genetic Algorithm,
2011 IEEE Conference on Open Systems (ICOS2011), September 25 - 28, 2011,
Langkawi, Malaysia
Essaims
- Aditi Bhateja, Shailender Kumar, Ashok K. Bhateja, Cryptanalysis
of Vigenere Cipher using Particle Swarm Optimization with Markov chain random
walk, International Journal on Computer Science and Engineering, May 2013
- Mohammad Faisal Uddin, Amr M. Youssef, Cryptanalysis
of Simple Substitution Ciphers Using Particle Swarm Optimization, 2006
IEEE Congress on Evolutionary Computation, July 16-21, 2006
- E.C. Laskariab et al., Evolutionary Computation
Based Cryptanalysis: A First Study, 1996
- T. Mekhaznia, Natural
Heuristics for Cryptanalysis, Journal of Information Security Research,
Volume 3, Number 2, June 2012
Autres
- Ajeet Singh, Kaushik Bhargav Sivangi, and Appala Naidu Tentu, Machine
Learning and Cryptanalysis: An In-Depth Exploration of Current Practices and
Future Potential, Journal of Computing Theories and Applications, pp.
257-272, vol. 1, no. 3, 2024 (February)
- Alkazaz, N. R., Irvine, S. A., & Teahan, W. J. (2018). An
automatic cryptanalysis of simple substitution ciphers using compression.
Information Security Journal: A Global Perspective, 27(1), 57-75. https://doi.org/10.1080/19393555.2018.1426799
- Noor R. Al-Kazaz, An Automatic Cryptanalysis
of Playfair Ciphers Using Compression, Proceedings of the 1st Conference
on Historical Cryptology, pages 115 124, Uppsala, Sweden, 18-20 June,
2018
- Arkan Kh Shakr Sabonchi, Bahriye Akay, Cryptanalysis
of Polyalphabetic Cipher Using Differential Evolution Algorithm, Tehnièki
vjesnik 27, 4(2020), 1101-1107
| |
Didier
Müller, 24.10.24 |
 |