Black Box Attack of Simulation Secret Key using Neural-Identifier: هجوم الصندوق الأسود لمحاكاة أنظمة التشفير الانسيابي باستخدام المعرف العصبي

Khaled M. Alalayah - Khadija M. H. Alaidarous - Ib
{"title":"Black Box Attack of Simulation Secret Key using Neural-Identifier: هجوم الصندوق الأسود لمحاكاة أنظمة التشفير الانسيابي باستخدام المعرف العصبي","authors":"Khaled M. Alalayah - Khadija M. H. Alaidarous - Ib","doi":"10.26389/ajsrp.u310119","DOIUrl":null,"url":null,"abstract":"  The issue of the cryptanalysis is defined as the unknown issue or problem related to the identification of the system where the major goal of the cryptanalysis is for the design of the system for various steps involved. Neural networks will be ideal tool for Black-Box system identification. The black-Box attacks against secret key cryptosystems (stream cipher system) would be presented by considering a Black-Box Neuro-Identifier model to retain two different objectives: first is for finding out the key from the provided plaintext-cipher to pair, while the second objective is to emulator construction a neuro-model for the target cipher system. There are many researches going on considering the various models of encryption where ANN is being used as single layered or multi layered perceptron. The above defined cryptographic techniques are sometimes also termed as the Neural Cryptography. As the ANN model relies on the feedforward working criteria means it can be used for the generation of some effective and efficient encryption methodologies. Cryptanalysis is considered as significant footstep for evaluating and checking quality of any cryptosystem. A portion of these cryptosystem guarantees secrecy and security of huge data trade from source to goal utilizing symmetric key cryptography. The cryptanalyst researches the quality and distinguishes the shortcoming of the key just as enciphering calculation. With the expansion in key size, the time and exertion required anticipating the right key increments. These systems for cryptanalysis are changing radically to decrease cryptographic multifaceted nature. In this paper a point by point study has been directed. Much cryptography strategies are accessible which depend on number hypothesis however it has the hindrance of necessity a substantial computational power, unpredictability and time utilization. To defeat these disadvantages, artificial neural networks (ANNs) have been connected to take care of numerous issues. The ANNs have numerous qualities, for example, learning, speculation, less information necessity, quick calculation, simplicity of usage, and programming and equipment accessibility, which make it exceptionally alluring for some applications. This paper gives a cutting-edge survey on the utilization of counterfeit neural systems in cryptography and concentrates their execution on estimation issues identified with cryptography.    ","PeriodicalId":15747,"journal":{"name":"Journal of engineering sciences and information technology","volume":"62 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of engineering sciences and information technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.26389/ajsrp.u310119","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

  The issue of the cryptanalysis is defined as the unknown issue or problem related to the identification of the system where the major goal of the cryptanalysis is for the design of the system for various steps involved. Neural networks will be ideal tool for Black-Box system identification. The black-Box attacks against secret key cryptosystems (stream cipher system) would be presented by considering a Black-Box Neuro-Identifier model to retain two different objectives: first is for finding out the key from the provided plaintext-cipher to pair, while the second objective is to emulator construction a neuro-model for the target cipher system. There are many researches going on considering the various models of encryption where ANN is being used as single layered or multi layered perceptron. The above defined cryptographic techniques are sometimes also termed as the Neural Cryptography. As the ANN model relies on the feedforward working criteria means it can be used for the generation of some effective and efficient encryption methodologies. Cryptanalysis is considered as significant footstep for evaluating and checking quality of any cryptosystem. A portion of these cryptosystem guarantees secrecy and security of huge data trade from source to goal utilizing symmetric key cryptography. The cryptanalyst researches the quality and distinguishes the shortcoming of the key just as enciphering calculation. With the expansion in key size, the time and exertion required anticipating the right key increments. These systems for cryptanalysis are changing radically to decrease cryptographic multifaceted nature. In this paper a point by point study has been directed. Much cryptography strategies are accessible which depend on number hypothesis however it has the hindrance of necessity a substantial computational power, unpredictability and time utilization. To defeat these disadvantages, artificial neural networks (ANNs) have been connected to take care of numerous issues. The ANNs have numerous qualities, for example, learning, speculation, less information necessity, quick calculation, simplicity of usage, and programming and equipment accessibility, which make it exceptionally alluring for some applications. This paper gives a cutting-edge survey on the utilization of counterfeit neural systems in cryptography and concentrates their execution on estimation issues identified with cryptography.    
黑匣子对干扰物的影响:利用神经识别模拟巡航系统的攻击
密码分析的问题被定义为与系统识别相关的未知问题或问题,其中密码分析的主要目标是为所涉及的各个步骤设计系统。神经网络将是黑盒系统识别的理想工具。针对秘密密钥密码系统(流密码系统)的黑盒攻击将考虑一个黑盒神经标识符模型,以保留两个不同的目标:一是从提供的明文密码中找出密钥进行配对,二是为目标密码系统构建仿真器神经模型。在各种加密模型中,人工神经网络被用作单层或多层感知器,目前有许多研究正在进行。上述定义的密码技术有时也被称为神经密码技术。由于人工神经网络模型依赖于前馈工作准则,这意味着它可以用于生成一些有效的加密方法。密码分析被认为是评估和检查任何密码系统质量的重要步骤。这些密码系统的一部分利用对称密钥加密保证了从源到目标的海量数据交易的保密性和安全性。密码分析人员在进行加密计算的同时,也在研究密钥的质量和缺点。随着键大小的增加,预期正确的键增量所需的时间和努力。这些用于密码分析的系统正在发生根本性的变化,以减少密码的多面性。本文进行了逐点研究。许多依赖于数字假设的加密策略是可访问的,但它有必要的大量计算能力,不可预测性和时间利用率的障碍。为了克服这些缺点,人工神经网络(ann)被连接起来处理许多问题。人工神经网络具有许多特性,例如,学习、推测、信息需求少、快速计算、使用简单、编程和设备可访问性,这使得它对某些应用程序非常有吸引力。本文对伪造神经系统在密码学中的应用进行了前沿调查,并将其集中在密码学中识别的估计问题上。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信