Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment

被引:1
作者
Tolba, Zakaria [1 ]
Derdour, Makhlouf [2 ]
Ferrag, Mohamed Amine [3 ]
Muyeen, S. M. [4 ]
Benbouzid, Mohamed [5 ]
机构
[1] Larbi Tebessi Univ, Lab Math Informat & Syst LAMIS, Tebessa 12022, Algeria
[2] Univ Oum El Bouaghi, Networks & Syst RSI Lab Annaba, Oum El Bouaghi 04000, Algeria
[3] Guelma Univ, Dept Comp Sci, Guelma 24000, Algeria
[4] Qatar Univ, Dept Elect Engn, Doha 2713, Qatar
[5] Univ Brest, UMR CNRS 6027, F-29238 Brest, France
关键词
Cryptanalysis; deep learning; convolution; deconvolution; plaintext; ciphertext; block cipher; P-Box; attack; IMAGE-SCRAMBLING ENCRYPTION; QUANTITATIVE CRYPTANALYSIS; PIXEL BIT; ALGORITHM; COMPRESSION; CIPHERS; VIDEO;
D O I
10.1109/ACCESS.2022.3204175
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. The evaluation of testing methods has been conceptualized as a regression task in which neural networks are supervised using a variety of parameters such as variations between input and output, number of iterations, and P-box generation patterns. On the other hand, the transfer learning skills demonstrated in this study indicate that discovering suitable testing models from the ground is also achievable using our model with optimum prior cryptographic expertise, where we contribute the results of deep learning in the field of deep learning based differential cryptanalysis development.Various experiments were performed on discrete and continuous chaotic and non-chaotic permutation patterns, and the best-performing model had an MSE of 1.8217e(-0)(4) and an R-2 of 1, demonstrating the practicality of the suggested technique.
引用
收藏
页码:94019 / 94039
页数:21
相关论文
共 50 条
  • [21] A Brute-Force Black-Box Method to Attack Machine Learning-Based Systems in Cybersecurity
    Zhang, Sicong
    Xie, Xiaoyao
    Xu, Yang
    IEEE ACCESS, 2020, 8 : 128250 - 128263
  • [22] Dynamic Black-Box Model Watermarking for Heterogeneous Federated Learning
    Liao, Yuying
    Jiang, Rong
    Zhou, Bin
    ELECTRONICS, 2024, 13 (21)
  • [23] Superpixel Attack Enhancing Black-Box Adversarial Attack with Image-Driven Division Areas
    Oe, Issa
    Yamamura, Keiichiro
    Ishikura, Hiroki
    Hamahira, Ryo
    Fujisawa, Katsuki
    ADVANCES IN ARTIFICIAL INTELLIGENCE, AI 2023, PT I, 2024, 14471 : 141 - 152
  • [24] Self-Taught Black-Box Adversarial Attack to Multilayer Network Automation
    Pan, Xiaoqin
    Zhu, Zuqing
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 2134 - 2139
  • [25] TAGA: A Transfer-based Black-box Adversarial Attack with Genetic Algorithms
    Huang, Liang-Jung
    Yu, Tian-Li
    PROCEEDINGS OF THE 2022 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE (GECCO'22), 2022, : 712 - 720
  • [26] Black-Box Adversarial Attack via Topological Adaptive Particle Swarm Optimization
    Yu Z.
    Kang J.
    Ye O.
    Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2023, 35 (08): : 1239 - 1248
  • [27] Automated Essay Scoring and the Deep Learning Black Box: How Are Rubric Scores Determined?
    Vivekanandan S. Kumar
    David Boulanger
    International Journal of Artificial Intelligence in Education, 2021, 31 : 538 - 584
  • [28] Automated Essay Scoring and the Deep Learning Black Box: How Are Rubric Scores Determined?
    Kumar, Vivekanandan S.
    Boulanger, David
    INTERNATIONAL JOURNAL OF ARTIFICIAL INTELLIGENCE IN EDUCATION, 2021, 31 (03) : 538 - 584
  • [29] An Approximated Gradient Sign Method Using Differential Evolution for Black-Box Adversarial Attack
    Li, Chao
    Wang, Handing
    Zhang, Jun
    Yao, Wen
    Jiang, Tingsong
    IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2022, 26 (05) : 976 - 990
  • [30] An Empirical Study of Fully Black-Box and Universal Adversarial Attack for SAR Target Recognition
    Peng, Bowen
    Peng, Bo
    Yong, Shaowei
    Liu, Li
    REMOTE SENSING, 2022, 14 (16)