Deep-Learning-based Cryptanalysis through Topic Modeling

被引:1
作者
Kumar, Kishore [1 ]
Tanwar, Sarvesh [1 ]
Kumar, Shishir [2 ]
机构
[1] Amity Univ, Amity Inst Nanotechnol, Gurugram, India
[2] Babasaheb Bhimrao Ambedkar Univ, Sch Informat Sci & Technol, Lucknow, Uttar Pradesh, India
关键词
cryptanalysis; chosen-plaintext cryptanalysis; deep learning; topic modeling; CNN; LSTM; GRU; CRYPTOGRAPHY;
D O I
10.48084/etasr.6515
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Neural cryptography is a technique that uses neural networks for secure data encryption. Cryptoanalysis, on the other hand, deals with analyzing and decrypting ciphers, codes, and encrypted text without using a real key. Chosen-plaintext cryptanalysis is a subfield of cryptanalysis where both plain text and ciphertext are available and the goal is either to find the encryption technique, the encryption key, or both. This study addresses chosen plaintext cryptanalysis within public key cryptography, to categorize topics of encrypted text. Using a fixed encryption technique and key, the focus was placed on creating a framework that identifies the topic associated with ciphertext, using diverse plaintexts and their corresponding cipher texts. To our knowledge, this is the first time that chosen-plaintext cryptanalysis has been discussed in the context of topic modeling. The paper used deep learning techniques such as CNNs, GRUs, and LSTMs to process sequential data. The proposed framework achieved up to 67% precision, 99% recall, 80% F1score, and 71% AUPR on a dataset, showcasing promising results and opening avenues for further research in this cryptanalysis subarea.
引用
收藏
页码:12524 / 12529
页数:6
相关论文
共 28 条
  • [1] Al-Omari AH, 2019, ENG TECHNOL APPL SCI, V9, P4203
  • [2] Al-Shabi MA, 2019, International Journal of Scientific and Research Publications (IJSRP), V9, P576, DOI DOI 10.29322/IJSRP.9.03.2019.P8779
  • [3] Alshammari AS, 2020, ENG TECHNOL APPL SCI, V10, P6187
  • [4] Barkan E, 2003, LECT NOTES COMPUT SC, V2729, P600
  • [5] Carlini N, 2020, LECT NOTES COMPUT SC, V12172, P189, DOI 10.1007/978-3-030-56877-1_7
  • [6] Chung JY, 2014, Arxiv, DOI [arXiv:1412.3555, 10.48550/arXiv.1412.3555, DOI 10.48550/ARXIV.1412.3555]
  • [7] Emerging Trends Word2Vec
    Church, Kenneth Ward
    [J]. NATURAL LANGUAGE ENGINEERING, 2017, 23 (01) : 155 - 162
  • [8] Neural Cryptography Based on Complex-Valued Neural Network
    Dong, Tao
    Huang, Tingwen
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2020, 31 (11) : 4999 - 5004
  • [9] Single secret image sharing scheme using neural cryptography
    Gupta, Mayank
    Gupta, Manu
    Deshmukh, Maroti
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (17-18) : 12183 - 12204
  • [10] Harba ESI, 2017, ENG TECHNOL APPL SCI, V7, P1781