In this paper we explore various approaches to using deep neural networks to per- form cryptanalysis, with the ultimate goal of having a deep neural network deci- pher encrypted data. We use long short-term memory networks to try to decipher encrypted text and we use a convolutional neural network to perform classification tasks on encrypted MNIST images. We find that although the network is unable to decipher encrypted data, it is able to perform classification on encrypted data. We also find that the networks performance is depending on what key were used to en- crypt the data. These findings could be valuable for further research into the topic of cryptanalysis using deep neural networks
A current trend of research focuses on artificial intelligence based cryptography which although pro...
Malware and ransomware are often encrypted to protect their own code, making it challenging to apply...
Digital image steganography is the process of embedding information within a cover image in a secure...
In this paper we explore various approaches to using deep neural networks to per- form cryptanalysis...
Encryption has an important role in protecting cyber assets. However the use of weak encryption algo...
At CRYPTO’19, A. Gohr proposed neural distinguishers for the lightweight block cipher Speck32/64, ac...
The use of neural networks for cryptography is demonstrated in this paper. There are two stages to t...
An important part of a cryptosystem is a cryptographic algorithm, which protects unauthorized attack...
Cryptanalysis identifies weaknesses of ciphers and investigates methods to exploit them in order to ...
Over the last twenty years, steganography has attracted in the consideration of numerous informatio...
This paper studies the use of deep learning (DL) models under a known-plaintext scenario. The goal o...
With the improvement of technology and the continuous expansion and deepening of neural network tech...
Privacy-preserving deep neural networks have become essential and have attracted the attention of ma...
The need to a robust and effective methods for secure data transferring makes the more credible. Two...
Deep neural networks have become the foundation of many modern intelligent systems. Recently, the au...
A current trend of research focuses on artificial intelligence based cryptography which although pro...
Malware and ransomware are often encrypted to protect their own code, making it challenging to apply...
Digital image steganography is the process of embedding information within a cover image in a secure...
In this paper we explore various approaches to using deep neural networks to per- form cryptanalysis...
Encryption has an important role in protecting cyber assets. However the use of weak encryption algo...
At CRYPTO’19, A. Gohr proposed neural distinguishers for the lightweight block cipher Speck32/64, ac...
The use of neural networks for cryptography is demonstrated in this paper. There are two stages to t...
An important part of a cryptosystem is a cryptographic algorithm, which protects unauthorized attack...
Cryptanalysis identifies weaknesses of ciphers and investigates methods to exploit them in order to ...
Over the last twenty years, steganography has attracted in the consideration of numerous informatio...
This paper studies the use of deep learning (DL) models under a known-plaintext scenario. The goal o...
With the improvement of technology and the continuous expansion and deepening of neural network tech...
Privacy-preserving deep neural networks have become essential and have attracted the attention of ma...
The need to a robust and effective methods for secure data transferring makes the more credible. Two...
Deep neural networks have become the foundation of many modern intelligent systems. Recently, the au...
A current trend of research focuses on artificial intelligence based cryptography which although pro...
Malware and ransomware are often encrypted to protect their own code, making it challenging to apply...
Digital image steganography is the process of embedding information within a cover image in a secure...