<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2227-1899</journal-id>
<journal-title><![CDATA[Revista Cubana de Ciencias Informáticas]]></journal-title>
<abbrev-journal-title><![CDATA[RCCI]]></abbrev-journal-title>
<issn>2227-1899</issn>
<publisher>
<publisher-name><![CDATA[Editorial Ediciones Futuro]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2227-18992023000100001</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Ataque al PRESENT-80 con el Algoritmo Gene´tico mediante aproximaciones sucesivas de componentes fijas]]></article-title>
<article-title xml:lang="en"><![CDATA[Attack to PRESENT-80 with the Genetic Algorithm using successive approximations of fixed components]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Donatien Charo´n]]></surname>
<given-names><![CDATA[Adrian]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Borges Trenard]]></surname>
<given-names><![CDATA[Miguel A.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Borges Quintana]]></surname>
<given-names><![CDATA[Mijail]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad de Oriente Departamento de Matema´tica ]]></institution>
<addr-line><![CDATA[ Santiago de Cuba]]></addr-line>
<country>Cuba</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,University Antonio Narin&#732;o  ]]></institution>
<addr-line><![CDATA[ Bogota´]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Universidad de Oriente Departamento de Matema´tica ]]></institution>
<addr-line><![CDATA[ Santiago de Cuba]]></addr-line>
<country>Cuba</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>03</month>
<year>2023</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>03</month>
<year>2023</year>
</pub-date>
<volume>17</volume>
<numero>1</numero>
<fpage>1</fpage>
<lpage>15</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_arttext&amp;pid=S2227-18992023000100001&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_abstract&amp;pid=S2227-18992023000100001&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_pdf&amp;pid=S2227-18992023000100001&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN Con el surgimiento y desarrollo de la llamada internet de las cosas y la necesidad del uso criptogra´fico en dispositivos de relativamente pocos recursos, es cada vez ma´s creciente el ana´lisis y criptoana´lisis de la familia de los cifrados en bloques ligeros. El cifrado PRESENT es un representante bien conocido de esa familia. En los u´ltimos an&#732;os se ha incrementado el uso que se le ha dado al Algoritmo Gene´tico (AG) en el criptoana´lisis a cifrados en bloque, no obstante, todavía es necesario seguir profundizando en su estudio. Por otra parte, el Algoritmo Gene´tico es un me´todo de optimizacio´n basado en bu´squedas heur´&#305;sticas en el espacio de las posibles soluciones, el cual intenta simular el comportamiento de la evolucio´n de las especies. Buscar la clave en todo el espacio de las claves es un problema complejo y puede resultar imposible. En el presente trabajo, se muestra un criptoana´lisis al PRESENT-80, utilizando el Algoritmo Gene´tico con una metodolog´&#305;a de reduccio´n sucesiva del conjunto de las posibles soluciones mediante un procedimiento de fijar componentes iterativamente.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT With the emergence and development of the so-called Internet of Things and the need for cryptographic use in devices with relatively few resources, the analysis and cryptanalysis of the family of light block ciphers is increasingly growing. The PRESENT block cipher is a well-known representative of that family. In recent years, the use that has been given to the Genetic Algorithm (GA) in the cryptanalysis of block ciphers has been increasing, however, it is still necessary to continue studying it in depth. On the other hand, the Genetic Algorithm is an optimization method based on heuristic searches in the space of possible solutions, which tries to simulate the behavior of the evolution of species. Searching for the key in the entire key space is a complex problem and can become impossible to solve. In the present work, a cryptanalysis of the PRESENT-80 is shown, using the Genetic Algorithm with a metodology of progresive reducing the set of possible solutions by means of a procedure of iterative fixing components.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[criptoana´lisis]]></kwd>
<kwd lng="es"><![CDATA[cifrados en bloques]]></kwd>
<kwd lng="es"><![CDATA[algoritmo gene´tico]]></kwd>
<kwd lng="es"><![CDATA[cifrado PRESENT-80]]></kwd>
<kwd lng="en"><![CDATA[cryptanalyisis]]></kwd>
<kwd lng="en"><![CDATA[block ciphers]]></kwd>
<kwd lng="en"><![CDATA[genetic algorithm]]></kwd>
<kwd lng="en"><![CDATA[PRESENT-80 block cipher]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ali]]></surname>
<given-names><![CDATA[Faez Hassan]]></given-names>
</name>
<name>
<surname><![CDATA[Jawad]]></surname>
<given-names><![CDATA[Riyam Noori]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Using evolving algorithms to cryptanalysis nonlinear cryptosystems]]></article-title>
<source><![CDATA[Baghdad Science Journal]]></source>
<year>2020</year>
<volume>17</volume>
<numero>2^sIssue NICST</numero>
<issue>2^sIssue NICST</issue>
<supplement>Issue NICST</supplement>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Baragada]]></surname>
<given-names><![CDATA[SambasivaRao]]></given-names>
</name>
<name>
<surname><![CDATA[P Satyanarayana]]></surname>
<given-names><![CDATA[Reddy]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey of cryptanalytic works based on genetic algorithms]]></article-title>
<source><![CDATA[International Journal of Emerging Trends &amp; Technology in Computer Science (IJETTCS)]]></source>
<year>2013</year>
<volume>2</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>18-22</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bodenhofer]]></surname>
<given-names><![CDATA[Ulrich]]></given-names>
</name>
</person-group>
<source><![CDATA[Genetic algorithms: theory and applications. Lecture notes, Fuzzy Logic Laboratorium Linz-Hagenberg]]></source>
<year>2003</year>
<volume>2004</volume>
<publisher-name><![CDATA[Winter]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bogdanov]]></surname>
<given-names><![CDATA[Andrey]]></given-names>
</name>
<name>
<surname><![CDATA[Knudsen]]></surname>
<given-names><![CDATA[Lars R]]></given-names>
</name>
<name>
<surname><![CDATA[Leander]]></surname>
<given-names><![CDATA[Gregor]]></given-names>
</name>
<name>
<surname><![CDATA[Paar]]></surname>
<given-names><![CDATA[Christof]]></given-names>
</name>
<name>
<surname><![CDATA[Poschmann]]></surname>
<given-names><![CDATA[Axel]]></given-names>
</name>
<name>
<surname><![CDATA[Robshaw]]></surname>
<given-names><![CDATA[Matthew JB]]></given-names>
</name>
<name>
<surname><![CDATA[Seurin]]></surname>
<given-names><![CDATA[Yannick]]></given-names>
</name>
<name>
<surname><![CDATA[Vikkelsoe]]></surname>
<given-names><![CDATA[Charlotte]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Present: An ultra-lightweight block cipher]]></article-title>
<source><![CDATA[International workshop on cryptographic hardware and embedded systems]]></source>
<year>2007</year>
<page-range>450-66</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Borges-Trenard]]></surname>
<given-names><![CDATA[Miguel A´]]></given-names>
</name>
<name>
<surname><![CDATA[Borges-Quintana]]></surname>
<given-names><![CDATA[Mijail]]></given-names>
</name>
<name>
<surname><![CDATA[Monier-Columbie´]]></surname>
<given-names><![CDATA[La´zaro]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An application of geneticalgorithm to cryptanalysis of block ciphers by partitioning the key space]]></article-title>
<source><![CDATA[Journal of Discrete Mathematical Sciences and Cryptography]]></source>
<year>2019</year>
<volume>25</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>325-34</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brown]]></surname>
<given-names><![CDATA[Joseph Alexander]]></given-names>
</name>
<name>
<surname><![CDATA[Houghten]]></surname>
<given-names><![CDATA[Sheridan]]></given-names>
</name>
<name>
<surname><![CDATA[Ombuki-Berman]]></surname>
<given-names><![CDATA[Beatrice]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Genetic algorithm cryptanalysis of a substitution permutation network]]></article-title>
<source><![CDATA[2009 IEEE Symposium on Computational Intelligence in Cyber Security]]></source>
<year>2009</year>
<page-range>115-21</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[W]]></surname>
<given-names><![CDATA[Eyal]]></given-names>
</name>
</person-group>
<source><![CDATA[Hands-on genetic algorithms with python]]></source>
<year>2020</year>
<publisher-loc><![CDATA[Birmingham, UK ]]></publisher-loc>
<publisher-name><![CDATA[Packt Publishing Ltd.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Grari]]></surname>
<given-names><![CDATA[Hicham]]></given-names>
</name>
<name>
<surname><![CDATA[Azouaoui]]></surname>
<given-names><![CDATA[Ahmed]]></given-names>
</name>
<name>
<surname><![CDATA[Zine-Dine]]></surname>
<given-names><![CDATA[Khalid]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A cryptanalytic attack of simplified-aes using ant colony optimization]]></article-title>
<source><![CDATA[International Journal of Electrical &amp; Computer Engineering]]></source>
<year>2019</year>
<volume>9</volume>
<numero>5</numero>
<issue>5</issue>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gunathilake]]></surname>
<given-names><![CDATA[Nilupulee A]]></given-names>
</name>
<name>
<surname><![CDATA[Al-Dubai]]></surname>
<given-names><![CDATA[Ahmed]]></given-names>
</name>
<name>
<surname><![CDATA[Buchanan]]></surname>
<given-names><![CDATA[William J]]></given-names>
</name>
<name>
<surname><![CDATA[Lo]]></surname>
<given-names><![CDATA[Owen]]></given-names>
</name>
</person-group>
<source><![CDATA[Electromagnetic analysis of an ultra-lightweight cipher: Present]]></source>
<year>2021</year>
<publisher-name><![CDATA[arXiv preprint arXiv]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Katoch]]></surname>
<given-names><![CDATA[Sourabh]]></given-names>
</name>
<name>
<surname><![CDATA[Chauhan]]></surname>
<given-names><![CDATA[Sumit Singh]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[Vijay]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A review on genetic algorithm: past, present, and future]]></article-title>
<source><![CDATA[Multimedia Tools and Applications]]></source>
<year>2021</year>
<volume>80</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>8091-126</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Khan]]></surname>
<given-names><![CDATA[Asif Hameed]]></given-names>
</name>
<name>
<surname><![CDATA[Lone]]></surname>
<given-names><![CDATA[Auqib Hamid]]></given-names>
</name>
<name>
<surname><![CDATA[Badroo]]></surname>
<given-names><![CDATA[Firdoos Ahmad]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The applicability of genetic algorithm in cryptanalysis: A survey]]></article-title>
<source><![CDATA[International Journal of Computer Applications]]></source>
<year>2015</year>
<volume>130</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>42-6</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kramer]]></surname>
<given-names><![CDATA[Oliver]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Genetic algorithms]]></article-title>
<source><![CDATA[Genetic algorithm essentials]]></source>
<year>2017</year>
<page-range>11-9</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lambora]]></surname>
<given-names><![CDATA[Annu]]></given-names>
</name>
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[Kunal]]></given-names>
</name>
<name>
<surname><![CDATA[Chopra]]></surname>
<given-names><![CDATA[Kriti]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Genetic algorithm-a literature review]]></article-title>
<source><![CDATA[2019 international conference on machine learning, big data, cloud and parallel computing (COMITCon)]]></source>
<year>2019</year>
<page-range>380-4</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[Ting Rong]]></given-names>
</name>
<name>
<surname><![CDATA[Teh]]></surname>
<given-names><![CDATA[Je Sen]]></given-names>
</name>
<name>
<surname><![CDATA[Yan]]></surname>
<given-names><![CDATA[Jasy Liew Suet]]></given-names>
</name>
<name>
<surname><![CDATA[Jamil]]></surname>
<given-names><![CDATA[Norziana]]></given-names>
</name>
<name>
<surname><![CDATA[Yeoh]]></surname>
<given-names><![CDATA[Wei-Zhu]]></given-names>
</name>
</person-group>
<source><![CDATA[A machine learning approach to predicting block cipher security]]></source>
<year>2020</year>
<page-range>122-32</page-range><publisher-name><![CDATA[Universiti Putra Malaysia]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[M]]></surname>
<given-names><![CDATA[LOZANO]]></given-names>
</name>
<name>
<surname><![CDATA[F]]></surname>
<given-names><![CDATA[HERRERA]]></given-names>
</name>
</person-group>
<source><![CDATA[Sf1. computacio´n evolutiva y algoritmos bioinspirados]]></source>
<year>2010</year>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[L]]></surname>
<given-names><![CDATA[Monier-Columbie´]]></given-names>
</name>
</person-group>
<source><![CDATA[Criptoana´lisis algebraico a cifrados en bloques ligeros]]></source>
<year>2018</year>
<publisher-loc><![CDATA[Cuba ]]></publisher-loc>
<publisher-name><![CDATA[Universidad de La Habana]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pandey]]></surname>
<given-names><![CDATA[Jai Gopal]]></given-names>
</name>
<name>
<surname><![CDATA[Goel]]></surname>
<given-names><![CDATA[Tarun]]></given-names>
</name>
<name>
<surname><![CDATA[Karmakar]]></surname>
<given-names><![CDATA[Abhijit]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Hardware architectures for present block cipher and their fpga implementations]]></article-title>
<source><![CDATA[IET Circuits, Devices &amp; Systems]]></source>
<year>2019</year>
<volume>13</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>958-69</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[So]]></surname>
<given-names><![CDATA[Jaewoo]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deep learning-based cryptanalysis of lightweight block ciphers]]></article-title>
<source><![CDATA[Security and Communication Networks]]></source>
<year>2020</year>
<volume>2020</volume>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tito-Corrioso]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
</person-group>
<source><![CDATA[Sobre el criptoana´lisis a cifrados en bloque mediante el algoritmo gene´tico]]></source>
<year>2021</year>
<publisher-loc><![CDATA[Cuba ]]></publisher-loc>
<publisher-name><![CDATA[Universidad de La Habana]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[O]]></surname>
<given-names><![CDATA[Tito-Corrioso]]></given-names>
</name>
<name>
<surname><![CDATA[MA]]></surname>
<given-names><![CDATA[Borges-Trenard]]></given-names>
</name>
<name>
<surname><![CDATA[M]]></surname>
<given-names><![CDATA[Borges-Quintana]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ataques a cifrados en bloques mediante bu´squedas en grupos cocientes de las claves]]></article-title>
<source><![CDATA[Rev. Cienc. Mat]]></source>
<year>2019</year>
<volume>33</volume>
<page-range>71-4</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tito-Corrioso]]></surname>
<given-names><![CDATA[Osmani]]></given-names>
</name>
<name>
<surname><![CDATA[Borges-Trenard]]></surname>
<given-names><![CDATA[Miguel Angel]]></given-names>
</name>
<name>
<surname><![CDATA[Borges-Quintana]]></surname>
<given-names><![CDATA[Mijail]]></given-names>
</name>
<name>
<surname><![CDATA[Rojas]]></surname>
<given-names><![CDATA[Omar]]></given-names>
</name>
<name>
<surname><![CDATA[Sosa-Go´mez]]></surname>
<given-names><![CDATA[Guillermo]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Study of parameters in the genetic algorithm for the attack on block ciphers]]></article-title>
<source><![CDATA[Symmetry]]></source>
<year>2021</year>
<volume>13</volume>
<numero>5</numero>
<issue>5</issue>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tortella]]></surname>
<given-names><![CDATA[Felipe Luiz]]></given-names>
</name>
<name>
<surname><![CDATA[Toledo]]></surname>
<given-names><![CDATA[Carlos Miguel Tobar]]></given-names>
</name>
<name>
<surname><![CDATA[Abbade]]></surname>
<given-names><![CDATA[Marcelo Lu´&#305;s Francisco]]></given-names>
</name>
</person-group>
<source><![CDATA[Aplicac¸a&#732;o de algo- ritmo gene´tico para determinac¸a&#732;o de chaves usadas em criptografia o´ptica mediante fatiamento espectral]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Valluri]]></surname>
<given-names><![CDATA[Maheswara Rao]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cryptanalysis of xinyu et al.&#8217;s ntru-lattice based key exchange protocol]]></article-title>
<source><![CDATA[Journal of Information and Optimization Sciences]]></source>
<year>2018</year>
<volume>39</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>475-9</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
