Neural cryptography: vulnerabilities and attack strategies

L. Beshaj, Gaurav Tyagi
{"title":"Neural cryptography: vulnerabilities and attack strategies","authors":"L. Beshaj, Gaurav Tyagi","doi":"10.1117/12.3013669","DOIUrl":null,"url":null,"abstract":"A number of research papers has been published using the architecture of adversarial neural networks to prove that communication between two neural net based on synchronized input can be achieved, and without knowledge of this synchronized information these systems can not be breached. In this paper we will try to evaluate these adversarial neural net architectures when a third party gain access to partial secret key, or a noisy secret key, or has knowledge about loss function, or loss values itself, or activation functions used during training of encryption layers. We explore the cryptanalysis side of it in which we will focus on vulnerabilities a neural-net based cryptography network can face. This can be used in future to improve the current neural net based cryptography architectures. In this paper we show that while the encryption key is necessary to decrypt the messages in neural network domain, the adversarial neural networks can occasionally decrypt messages or raise a concern which will require further training.","PeriodicalId":178341,"journal":{"name":"Defense + Commercial Sensing","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Defense + Commercial Sensing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.3013669","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

A number of research papers has been published using the architecture of adversarial neural networks to prove that communication between two neural net based on synchronized input can be achieved, and without knowledge of this synchronized information these systems can not be breached. In this paper we will try to evaluate these adversarial neural net architectures when a third party gain access to partial secret key, or a noisy secret key, or has knowledge about loss function, or loss values itself, or activation functions used during training of encryption layers. We explore the cryptanalysis side of it in which we will focus on vulnerabilities a neural-net based cryptography network can face. This can be used in future to improve the current neural net based cryptography architectures. In this paper we show that while the encryption key is necessary to decrypt the messages in neural network domain, the adversarial neural networks can occasionally decrypt messages or raise a concern which will require further training.
神经密码学:漏洞和攻击策略
已经发表的一些研究论文利用对抗神经网络的架构证明,两个神经网络之间可以实现基于同步输入的通信,而如果不知道这些同步信息,这些系统就无法被攻破。在本文中,我们将尝试在第三方获得部分秘钥或噪声秘钥,或了解损失函数、损失值本身或加密层训练过程中使用的激活函数的情况下,对这些对抗性神经网络架构进行评估。我们将从密码分析的角度进行探讨,重点关注基于神经网络的密码学网络可能面临的漏洞。今后,我们可以利用这一点来改进当前基于神经网络的加密架构。本文表明,虽然在神经网络领域,加密密钥是解密信息的必要条件,但对抗性神经网络偶尔也会解密信息或引起关注,这就需要进一步的训练。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信