Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


January Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the January 2023 Edition of the journal. The last date of research paper submission is December 15, 2022.

Cryptanalysis of Nonlinear Stream Cipher Cryptosystem based on Improved Particle Swarm Optimization

Salim A. Abbas Al-Ageelee, Riyam N. J. Kadhum. Published in Security

International Journal of Applied Information Systems
Year of Publication: 2017
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Salim A. Abbas Al-Ageelee, Riyam N. J. Kadhum
Download full text
  1. Salim Abbas A Al-Ageelee and Riyam N J Kadhum. Cryptanalysis of Nonlinear Stream Cipher Cryptosystem based on Improved Particle Swarm Optimization. International Journal of Applied Information Systems 11(11):43-52, March 2017. URL, DOI BibTeX

    	author = "Salim A. Abbas Al-Ageelee and Riyam N. J. Kadhum",
    	title = "Cryptanalysis of Nonlinear Stream Cipher Cryptosystem based on Improved Particle Swarm Optimization",
    	journal = "International Journal of Applied Information Systems",
    	issue_date = "March 2017",
    	volume = 11,
    	number = 11,
    	month = "Mar",
    	year = 2017,
    	issn = "2249-0868",
    	pages = "43-52",
    	url = "",
    	doi = "10.5120/ijais2017451658",
    	publisher = "Foundation of Computer Science (FCS), NY, USA",
    	address = "New York, USA"


Stream cipher is one of the hard electronic cipher systems because of high security and difficulty in breaking it. In this paper the proposed cryptanalysis system based on a Particle Swarm Optimization (PSO) with suggestions for improving the achievement of PSO, by using Simulated Annealing (SA) that is the first part of this paper. The second part represented by a comparison study for the cryptanalysis results obtained by the Improved PSO (IPSO) with classical PSO and Genetic Algorithm (GA).The cryptanalysis process include finding the initial state of the attacked stream cipher cryptosystem using ciphertext only attack.


  1. Schneier, B.1996, Applied Cryptography, Second Edition: Protocols, Algorithms andSource Code in C.
  2. Holland,J.H.1992,Adaptation in Natural andArtificial Systems.
  3. M.Milanovic,"Solving the generalised vertexcover problem by Genetic Algorithm ", Computing and Informatics,2010.
  4. Bazgan,C.,Luchian,H.1995. A geneticAlgorithm for maximal Clique Problem. Inproceeding of the International Conference in Ales,France.
  5. H.Bhasin,Manoj,"Regression testing using Coupling and Genetic Algorithms", InternationalJournal of Computer Science and Information Technologies,2012.
  6. H.Bhasin,N.Singla,"Genetic based algorithm forN-Puzzle problem", International Journal of Computer Application,2012.
  7. Y.Liao et al,"Evolutionary algorithm toTraveling Salesman Problems", Computer &Mathematics with Applications,2012.
  8. Papoulis, A. “Probability Random Variables,and Stochastic Process”, McGraw-Hill College,October, 2001.
  9. Parsopoulos K. E. and Vrahatis M.N., “Recent Approaches to Global optimization Problemsthrough Particle SwarmOptimization”, Kluwer Academic Publishers, Netherlands, Natural Computing 1, pp 235–306, 2002.
  10. A.J.Clark," Optimisation Heuristics for Cryptology", Information Security ResearchCentre Faculty of Information TechnologyQueensland University of Technology, 1998.
  11. M. F Uddin and Amr M. Youssef," Cryptanalysis of Simple Substitution Ciphers Using Particle Swarm Optimization". IEEE,Congress on Evolutionary Computation,Canada,2006.
  12. Rajaa R.Yako," Decrypting A Class Of Stream Cipher Using Ciphertext Only, ComparativeStudy", Master Thesis, Higher Academy for Scientific and Humanistic Studies, Departmentof Computer Science,2007.
  13. Sarab M. Hameed and Dalal N. Hmood, "particles swarm optimization for the cryptanalysis of transposition cipher " . Journalof Al-Nahrain University , Vol.13(4),pp.211-215, 2010.
  14. Hussein Ali Mohammed Al_Sharifi ,"Cryptanalysis of Stream Cipher System Using Particle Swarm Optimization Algorithm".Journal of Kerbala University , Vol. 8 No.4 Scientific , 2010.
  15. Benjamin Nicholas Ferriman," Cryptanalysis of the RC4 Stream Cipher using EvolutionaryComputation Methods",Master Thesis, University of Guelph, Guelph, Canada,2013.
  16. Ali A. Abd , Hameed A. Younis, and Wasan S.Awad," Attacking of stream Cipher Systems Using a Genetic Algorithm". Journal of Univesity of Thi-Qar, ISSN: 66291818,Vol. 8, Issue. 3, 2013.
  17. Goldberg,D.E.1989. Genetic Algorithm insearch, optimization and machine learning.
  18. Goldberg,D.E et al.2000. BayesuanOptimization Algorithm, population sizing and time to convergence, University of Illinois,USA.
  19. Melanie,M.1996. An introduction to a GeneticAlgorithm:MIT press paperback edition.
  20. Bhasin,H.2015.Algorithms: Design andAnalaysis.
  21. Singiresu S. Rao "Engineering Optimization Theory and Practice" Book, by John Wiley & Sons, Inc.2009.
  22. James Kennedy and Russell Eberhart "Particle Swarm Optimization", Book, IEEE 1995.
  23. James Kennedy "The Particle Swarm: Social Adaptation of Knowledge" IEEE, 1997.
  24. S. C. Krirkpatrick, J. D. Gellatt, and M. P. Vecchi, “Optimization by simulated annealing”, Science, vol. 220,no.4598,pp.671-680,1983.


Stream Cipher System, Cryptanalysis, Particle Swarm Optimization, Genetic Algorithms, Simulated Annealing, Improved Particle Swarm Optimization