Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment

被引:1
|
作者
Tolba, Zakaria [1 ]
Derdour, Makhlouf [2 ]
Ferrag, Mohamed Amine [3 ]
Muyeen, S. M. [4 ]
Benbouzid, Mohamed [5 ]
机构
[1] Larbi Tebessi Univ, Lab Math Informat & Syst LAMIS, Tebessa 12022, Algeria
[2] Univ Oum El Bouaghi, Networks & Syst RSI Lab Annaba, Oum El Bouaghi 04000, Algeria
[3] Guelma Univ, Dept Comp Sci, Guelma 24000, Algeria
[4] Qatar Univ, Dept Elect Engn, Doha 2713, Qatar
[5] Univ Brest, UMR CNRS 6027, F-29238 Brest, France
关键词
Cryptanalysis; deep learning; convolution; deconvolution; plaintext; ciphertext; block cipher; P-Box; attack; IMAGE-SCRAMBLING ENCRYPTION; QUANTITATIVE CRYPTANALYSIS; PIXEL BIT; ALGORITHM; COMPRESSION; CIPHERS; VIDEO;
D O I
10.1109/ACCESS.2022.3204175
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. The evaluation of testing methods has been conceptualized as a regression task in which neural networks are supervised using a variety of parameters such as variations between input and output, number of iterations, and P-box generation patterns. On the other hand, the transfer learning skills demonstrated in this study indicate that discovering suitable testing models from the ground is also achievable using our model with optimum prior cryptographic expertise, where we contribute the results of deep learning in the field of deep learning based differential cryptanalysis development.Various experiments were performed on discrete and continuous chaotic and non-chaotic permutation patterns, and the best-performing model had an MSE of 1.8217e(-0)(4) and an R-2 of 1, demonstrating the practicality of the suggested technique.
引用
收藏
页码:94019 / 94039
页数:21
相关论文
共 50 条
  • [1] Rearranging Pixels is a Powerful Black-Box Attack for RGB and Infrared Deep Learning Models
    Pomponi, Jary
    Dantoni, Daniele
    Alessandro, Nicolosi
    Scardapane, Simone
    IEEE ACCESS, 2023, 11 : 11298 - 11306
  • [2] Deep Learning for Black-Box Modeling of Audio Effects
    Ramirez, Marco A. Martinez
    Benetos, Emmanouil
    Reiss, Joshua D.
    APPLIED SCIENCES-BASEL, 2020, 10 (02):
  • [3] DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection
    Li, Yuanchun
    Hua, Liayi
    Wang, Haoyu
    Chen, Chunyang
    Liu, Yunxin
    2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2021), 2021, : 263 - 274
  • [4] Humanoid: A Deep Learning-based Approach to Automated Black-box Android App Testing
    Li, Yuanchun
    Yang, Ziyue
    Guo, Yao
    Chen, Xiangqun
    34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2019), 2019, : 1070 - 1073
  • [5] Adaptive hyperparameter optimization for black-box adversarial attack
    Zhenyu Guan
    Lixin Zhang
    Bohan Huang
    Bihe Zhao
    Song Bian
    International Journal of Information Security, 2023, 22 : 1765 - 1779
  • [6] Black-Box Adversarial Attack via Overlapped Shapes
    Williams, Phoenix
    Li, Ke
    Min, Geyong
    PROCEEDINGS OF THE 2022 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION, GECCO 2022, 2022, : 467 - 468
  • [7] An Effective Way to Boost Black-Box Adversarial Attack
    Feng, Xinjie
    Yao, Hongxun
    Che, Wenbin
    Zhang, Shengping
    MULTIMEDIA MODELING (MMM 2020), PT I, 2020, 11961 : 393 - 404
  • [8] Fuzzy Modeling from Black-Box Data with Deep Learning Techniques
    de la Rosa, Erick
    Yu, Wen
    Sossa, Humberto
    ADVANCES IN NEURAL NETWORKS, PT I, 2017, 10261 : 304 - 312
  • [9] Understanding the black-box: towards interpretable and reliable deep learning models
    Qamar, Tehreem
    Bawany, Narmeen Zakaria
    PEERJ COMPUTER SCIENCE, 2023, 9
  • [10] Adaptive hyperparameter optimization for black-box adversarial attack
    Guan, Zhenyu
    Zhang, Lixin
    Huang, Bohan
    Zhao, Bihe
    Bian, Song
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (06) : 1765 - 1779