An Automatic Cryptanalysis of Arabic Transposition Ciphers using Compression
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 11
Abstract
This paper introduces a compression-based method adapted for the automatic cryptanalysis of Arabic transposition ciphers. More specifically, this paper presents how a Prediction by Partial Matching (‘PPM’) compression scheme, a method that shows a high level of performance when applied to the different natural language processing tasks, can also be used for the automatic decryption of transposition ciphers for the Arabic language. Another well known compression scheme, Gzip, is also investigated in this paper with less efficient performance demonstrated by this method. In order to achieve readability, two further compression based approaches for space insertion are evaluated as well in this paper. The results of our experiments with 125 Arabic cryptograms of different lengths show that 97%of the cryptograms are successfully decrypted without any errors using PPM compression models. As well in a post-processing step, we can effectively segment the output that is produced by the automatic insertion of spaces resulting with only a few errors overall. As far as we know, this is the first work to demonstrate an effective automatic cryptanalysis for transposition ciphers in Arabic.
Authors and Affiliations
Noor R. Al-Kazaz, William J. Teahan
Reducing Attributes in Rough Set Theory with the Viewpoint of Mining Frequent Patterns
The main objective of the Attribute Reduction problem in Rough Set Theory is to find and retain the set of attributes whose values vary most between objects in an Information System or Decision System. Besides, Mining Fr...
Congestion Control Techniques in WSNs: A Review
Congestion control has a great importance in wireless sensor network (WSN), where efficient application of congestion control mechanisms can prolong the network lifetime. Thus, proper examination is needed to improve mor...
Authentication and Authorization Design in Honeybee Computing
Honeybee computing is a concept based on advanced ubiquitous computing technology to support Smart City Smart Village (SCSV) initiatives. Advanced ubiquitous computing is a computing environment that contains many device...
Firefly Algorithm for Adaptive Emergency Evacuation Center Management
Flood disaster is among the most devastating natural disasters in the world, claiming more lives and causing property damage. The pattern of floods across all continents has been changing, becoming more frequent, intense...
Building BTO System in the Sanitary Materials Manufacturer with the Utilization of the High Accuracy Forecasting
In recent years, BTO (Build to Order) system is prevailing. It pursues short lead time, minimum stocks, and thereby minimum cost. But the high accuracy demand forecasting is inevitable for the parts manufacturers. In thi...