Modern day lightweight block ciphers provide powerful encryption methods for securing IoT communication data. Tiny digital devices exchange private data which the individual users might not be willing to get disclosed. On the other hand, the adversaries try their level best to capture this private data. The first step towards this is to identify the encryption scheme. This work is an effort to construct a distinguisher to identify the cipher used in encrypting the traffic data. We try to establish a deep learning based method to identify the encryption scheme used from a set of three lightweight block ciphers viz. LBlock, PRESENT and SPECK. We make use of images from MNIST and fashion MNIST data sets for establishing the cryptographic disti...
With recent advancements in multimedia technologies, the security of digital data has become a criti...
The field of Encryption is getting popularity in the current period in which information security is...
Doctor of PhilosophyDepartment of Computer ScienceArslan MunirIn an era dominated by increasing use ...
Encryption has an important role in protecting cyber assets. However the use of weak encryption algo...
As the world keeps advancing, the need for automated interconnected devices has started to gain sign...
Most of the traditional cryptanalytic technologies often require a great amount of time, known plain...
Recent years have seen a major involvement of deep learning architecture in the cryptanalysis of var...
At CRYPTO’19, A. Gohr proposed neural distinguishers for the lightweight block cipher Speck32/64, ac...
Machine learning has recently started to gain the attention of cryptographic researchers, notably in...
This paper studies the use of deep learning (DL) models under a known-plaintext scenario. The goal o...
In this paper we explore various approaches to using deep neural networks to per- form cryptanalysis...
The lightweight block cipher PRESENT has become viable for areas like IoT (Internet of Things) and R...
While many similarities between Machine Learning and cryptanalysis tasks exists, so far no major res...
Encryption modes affect the security of block ciphers. This paper proposes a new approach for identi...
This paper analyzes the use of machine learning techniques for the identification of encryption algo...
With recent advancements in multimedia technologies, the security of digital data has become a criti...
The field of Encryption is getting popularity in the current period in which information security is...
Doctor of PhilosophyDepartment of Computer ScienceArslan MunirIn an era dominated by increasing use ...
Encryption has an important role in protecting cyber assets. However the use of weak encryption algo...
As the world keeps advancing, the need for automated interconnected devices has started to gain sign...
Most of the traditional cryptanalytic technologies often require a great amount of time, known plain...
Recent years have seen a major involvement of deep learning architecture in the cryptanalysis of var...
At CRYPTO’19, A. Gohr proposed neural distinguishers for the lightweight block cipher Speck32/64, ac...
Machine learning has recently started to gain the attention of cryptographic researchers, notably in...
This paper studies the use of deep learning (DL) models under a known-plaintext scenario. The goal o...
In this paper we explore various approaches to using deep neural networks to per- form cryptanalysis...
The lightweight block cipher PRESENT has become viable for areas like IoT (Internet of Things) and R...
While many similarities between Machine Learning and cryptanalysis tasks exists, so far no major res...
Encryption modes affect the security of block ciphers. This paper proposes a new approach for identi...
This paper analyzes the use of machine learning techniques for the identification of encryption algo...
With recent advancements in multimedia technologies, the security of digital data has become a criti...
The field of Encryption is getting popularity in the current period in which information security is...
Doctor of PhilosophyDepartment of Computer ScienceArslan MunirIn an era dominated by increasing use ...