Abstract
The Internet and mobile revolution have had a profound impact on human life, bringing about significant transformations. These technological advancements have provided individuals with a wide range of devices for swift information exchange, catering to various needs. One crucial aspect of any information system is the assurance of secure information exchange from its source to its destination, accomplished through the implementation of cryptography. Cryptanalysis, as a vital process, assesses the strength and vulnerabilities of these systems, while also conducting security audits. Whenever a novel cryptographic method emerges, comprehensive analysis becomes indispensable, encompassing perspectives from hackers, cryptanalysts, and users, alongside performance evaluations. With a focus on computational methods for cryptanalysis, researchers continue to develop new techniques and algorithms. This paper presents an extensive survey of these advancements, comparing them to state-of-the-art approaches and discussing future prospects and directions in the realm of cryptic mining.
Keyword
Cryptography, Cryptanalysis, Hacker, AI-Genetic Algorithm, Swarm Intelligence cipher, Neural Network.
PDF Download (click here)
|