Deep-Learning-based Cryptanalysis through Topic Modeling

被引:1
作者
Kumar, Kishore [1 ]
Tanwar, Sarvesh [1 ]
Kumar, Shishir [2 ]
机构
[1] Amity Univ, Amity Inst Nanotechnol, Gurugram, India
[2] Babasaheb Bhimrao Ambedkar Univ, Sch Informat Sci & Technol, Lucknow, Uttar Pradesh, India
关键词
cryptanalysis; chosen-plaintext cryptanalysis; deep learning; topic modeling; CNN; LSTM; GRU; CRYPTOGRAPHY;
D O I
10.48084/etasr.6515
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Neural cryptography is a technique that uses neural networks for secure data encryption. Cryptoanalysis, on the other hand, deals with analyzing and decrypting ciphers, codes, and encrypted text without using a real key. Chosen-plaintext cryptanalysis is a subfield of cryptanalysis where both plain text and ciphertext are available and the goal is either to find the encryption technique, the encryption key, or both. This study addresses chosen plaintext cryptanalysis within public key cryptography, to categorize topics of encrypted text. Using a fixed encryption technique and key, the focus was placed on creating a framework that identifies the topic associated with ciphertext, using diverse plaintexts and their corresponding cipher texts. To our knowledge, this is the first time that chosen-plaintext cryptanalysis has been discussed in the context of topic modeling. The paper used deep learning techniques such as CNNs, GRUs, and LSTMs to process sequential data. The proposed framework achieved up to 67% precision, 99% recall, 80% F1score, and 71% AUPR on a dataset, showcasing promising results and opening avenues for further research in this cryptanalysis subarea.
引用
收藏
页码:12524 / 12529
页数:6
相关论文
共 28 条
[11]   Advanced Encryption Standard (AES) [J].
Network Box .
Netw. Secur., 2009, 12 (8-12) :8-12
[12]  
Iftikhar U, 2021, ENG TECHNOL APPL SCI, V11, P7867
[13]  
kaggle, IMDB DAT 50K MOV REV
[14]  
Khyani D., 2021, Journal of University of Shanghai of Science and Technology, V22, P350
[15]  
Le VH, 2023, ENG TECHNOL APPL SCI, V13, P10100
[16]   Deep learning [J].
LeCun, Yann ;
Bengio, Yoshua ;
Hinton, Geoffrey .
NATURE, 2015, 521 (7553) :436-444
[17]   A Survey of Convolutional Neural Networks: Analysis, Applications, and Prospects [J].
Li, Zewen ;
Liu, Fan ;
Yang, Wenjie ;
Peng, Shouheng ;
Zhou, Jun .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2022, 33 (12) :6999-7019
[18]  
Luc NQ, 2023, ENG TECHNOL APPL SCI, V13, P10401
[19]   Cryptanalysis and Improvement of Novel Image Encryption Technique Using Hybrid Method of Discrete Dynamical Chaotic Maps and Brownian Motion [J].
Munir, Noor ;
Khan, Majid ;
Ismail, Abd Al Karim Haj ;
Hussain, Iqtadar .
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (05) :6571-6584
[20]   A Review Paper on Cryptography [J].
Qadir, Abdalbasit Mohammed ;
Varol, Nurhayat .
2019 7TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2019,