Javascript must be enabled to continue!
Deep Learning-Based Cryptanalysis of a Simplified AES Cipher
View through CrossRef
Recently, Deep Neural Networks have shown great deal of reliability and applicability as its applications spread in different areas. This paper proposes a cryptanalysis model based on Deep Neural Network, the neural network takes in plaintexts and their corresponding ciphertexts to predict the secret key of the cipher. We proposes two different approaches, in the first we use multi-layer perceptron (MLP). While in the second, the cryptanalysis problem is modeled as a multi-label classification problem, we introduce appropriate Deep Neural Network based methods for tackling such problem. We illustrate the effectiveness of the approach of the DNN-based cryptanalysis by attacking on Simplified AES block cipher. Therefore, specific metrics are readapted to the cryptanalysis context and used to evaluate the proposed schemes. The results indicate that treating cryptanalysis problem as multi-label classification is more suitable and can be a useful and promising tool for the cryptanalysis task.
Title: Deep Learning-Based Cryptanalysis of a Simplified AES Cipher
Description:
Recently, Deep Neural Networks have shown great deal of reliability and applicability as its applications spread in different areas.
This paper proposes a cryptanalysis model based on Deep Neural Network, the neural network takes in plaintexts and their corresponding ciphertexts to predict the secret key of the cipher.
We proposes two different approaches, in the first we use multi-layer perceptron (MLP).
While in the second, the cryptanalysis problem is modeled as a multi-label classification problem, we introduce appropriate Deep Neural Network based methods for tackling such problem.
We illustrate the effectiveness of the approach of the DNN-based cryptanalysis by attacking on Simplified AES block cipher.
Therefore, specific metrics are readapted to the cryptanalysis context and used to evaluate the proposed schemes.
The results indicate that treating cryptanalysis problem as multi-label classification is more suitable and can be a useful and promising tool for the cryptanalysis task.
Related Results
Minimum Adversarial Examples
Minimum Adversarial Examples
Deep neural networks in the area of information security are facing a severe threat from adversarial examples (AEs). Existing methods of AE generation use two optimization models: ...
On the Security of Qalqan Cipher Against Differential Cryptanalysis
On the Security of Qalqan Cipher Against Differential Cryptanalysis
In 2021, the first version of block cipher Qalqan was presented. It is positioned as a candidate to the future national encryption standard of the Republic of ...
Evaluation of cardiac adverse events with nivolumab using a Japanese real-world database
Evaluation of cardiac adverse events with nivolumab using a Japanese real-world database
Abstract
The present study aimed to determine the risk of nivolumab-induced cardiac adverse events (AEs), time to onset, incidence rates, and post hoc outcomes using the Ja...
Higher Age (≥60 Years) Increases the Risk for Adverse Events during Autologous Hematopoietic Stem Cell Transplantation
Higher Age (≥60 Years) Increases the Risk for Adverse Events during Autologous Hematopoietic Stem Cell Transplantation
Autologous hematopoietic stem cell transplantation (autoHSCT) is a standard of care for patients with hemato-oncologic diseases. This procedure is highly regulated, and a quality a...
Symmetric Encryption Algorithm using ASCII Values
Symmetric Encryption Algorithm using ASCII Values
Cryptography at its very core is nothing but math - pure, simple, undiluted math. Math created algorithms that are basics for various encryption algorithm. Encryption is a method i...
Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing
Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing
Cipher text-Policy Attribute-Based Encryption is an access control technique widely used in cloud computing for enforcing data access policies based on attributes. However, existin...
Template attack based on uBlock cipher algorithm
Template attack based on uBlock cipher algorithm
The uBlock cipher algorithm is a family of lightweight block cipher algorithms, which was proposed by Wu Wenling, Zhang Lei and others in 2019. Its block length and key length supp...
Deep convolutional neural network and IoT technology for healthcare
Deep convolutional neural network and IoT technology for healthcare
Background Deep Learning is an AI technology that trains computers to analyze data in an approach similar to the human brain. Deep learning algorithms can find complex patterns in ...


