Abstract
As machine learning is used to analyse data and produce some action based on that data, the application in the domain of cryptanalysis opens new points of view, since the key space of any complex cipher system is large. When concerning machine learning with the algorithms of cryptography, the possibility to learn from the experience that is provided by information retrieval, is being considered. With the understanding that cryptanalysis can be used for improvement and producing more complex solutions in the field of cryptography, common features are sought between these three fields. This paper aims to present the application of machine learning in the field of cryptanalysis, as a prime step for auditing and checking the strength of cryptosystems. Some of these cryptosystems ensure confidentiality and security of a variety of information exchanged from source to destination using symmetric key cryptography. Accordingly, understanding how the algorithms are maintaining the stability is the fundamental aspect for proceeding with the analysis. The experimental part of this paper provides a solution for application of neural networks in cryptanalysis. We show that AES with ECB mode is vulnerable to ciphertext-plaintext attacks. The analysis is focused on trying different sizes of keys for obtaining the ciphertexts from plaintexts. At the end, we discuss how that is impacting the difficulty of data reveal by decrypting with DNN (Artificial Neural Network).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Jayachandiran, K.: A machine learning approach for cryptanalysis. Department of Computer Science, Golisano College of Computing and Information Sciences, Rochester Institute of Technology, Rochester, NY (2018)
Alani, M.M.: Neuro-cryptanalysis of DES and triple-DES. In: Huang, T., Zeng, Z., Li, C., Leung, C.S. (eds.) ICONIP 2012. LNCS, vol. 7667, pp. 637–646. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34500-5_75
Moore’s Law: Investopedia. https://www.investopedia.com/terms/m/mooreslaw. Accessed 01 Aug 2020
De Cannière, C., Biryukov, A., Preneel, B.: An introduction to block cipher cryptanalysis. Proc. IEEE 94(2), 346–356 (2006)
Lagerhjelm, L.: Extracting information from encrypted data using deep neural networks. Master paper, Department of Applied Physics and Electronics, Umeå University (2019)
Al-Janabi, S.T., Al-Khateeb, B., Abd, A. J.: Intelligent techniques in cryptanalysis: review and future directions. UHD J. Sci. Technol. 1, 1–10 (2017). University of Human Development Sulaimaniya, KRG-Iraq
Rivest, R.L.: Cryptography and machine learning. In: Imai, H., Rivest, R.L., Matsumoto, T. (eds.) ASIACRYPT 1991. LNCS, vol. 739, pp. 427–439. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-57332-1_36
Focardi, R., Luccio, F.L.: Neural cryptanalysis of classical ciphers. In: Proceedings of the 19th Italian Conference on Theoretical Computer Science, ICTCS 2018, pp. 104–115. Department of Pure and Applied Sciences, University of Urbino Carlo Bo, Urbino, Italy (2018)
Alkhzaimi, H.A.: Cryptanalysis of selected block ciphers. Department of Mathematics and Computer Science-COMPUTE, The Technical University of Denmark, Denmark (2014)
Xinyi Hu, X., Zhao, Y.: Research on plaintext restoration of AES based on neural network. Secur. Commun. Net. 2018 (2018). Article ID 6868506 (2018)
TechTarget Search Security: Cryptology. https://searchsecurity.techtarget.com/definition/cryptology. Accessed 20 Sept 2020
TechTarget Search Security: Cryptography. https://searchsecurity.techtarget.com/definition/cryptography. Accessed 12 Sept 2020
Infosec Insights: 5 Differences between symmetric vs asymmetric encryption. https://sectigostore.com/blog/5-differences-between-symmetric-vs-asymmetric-encryption/. Accessed 06 Aug 2020
Geeks for Geeks: Difference between private key and public key. https://www.geeksforgeeks.org/difference-between-private-key-and-public-key. Accessed 02 Aug 2020
Geeks for Geeks: Difference between block cipher and stream cipher. https://www.geeksforgeeks.org/difference-between-block-cipher-and-stream-cipher/. Accessed 18 July 2020
YouTube: Computerphile, AES explained (advanced encryption standard). https://www.youtube.com/watch?v=O4xNJsjtN6E. Accessed 21 Aug 2020
ATP: AES. https://www.atpinc.com/blog/what-is-aes-256-encryption. Accessed 28 July 2020
Comparitech: What is AES encryption and how does it work? https://www.comparitech.com/blog/information-security/what-is-aes-encryption/. Accessed 21 Aug 2020
Wikipedia: Advanced encryption standard. https://en.wikipedia.org/wiki/Advanced_Encryption_Standard. Accessed 31 Aug 2016
TechTarget Search Security: Cryptanalysis. https://searchsecurity.techtarget.com/definition/cryptanalysis. Accessed 22 Aug 2020
ScienceDirect: Cryptanalysis. https://www.sciencedirect.com/topics/computer-science/cryptanalysis. Accessed 10 Sept 2020
Britannica: Cryptanalysis. https://www.britannica.com/topic/cryptology/Cryptanalysis. Accessed 07 Aug 2020
Chio, C., Freeman, D.: Machine Learning & Security: Protecting Systems with Data and Algorithms, 1st edn. O’Reilly Media, Incorporated, Sebastopol (2018)
Yegnanarayana, B.: Artificial neural networks for pattern recognition. Department of Computer Science and Engineering, Indian Institute of Technology, Madras, India (1993)
Meduim, Towards Data Science: Supervised vs. unsupervised learning. https://towardsdatascience.com/supervised-vs-unsupervised-learning-14f68e32ea8d. Accessed 26 Aug 2020
Meduim, Towards Data Science: Neural Networks from Scratch with Python Code and Math in Detail—I. https://medium.com/towards-artificial-intelligence/building-neural-networks-from-scratch-with-python-code-and-math-in-detail-i-536fae5d7bbf. Accessed 27 July 2020
Kaggle: IMDB dataset (Sentiment analysis) in CSV format. https://www.kaggle.com/columbine/imdb-dataset-sentiment-analysis-in-csv-format. Accessed 20 Aug 2020
Meduim, Towards Data Science: The mathematic behind deep learning. https://towardsdatascience.com/the-mathematics-behind-deep-learning-f6c35a0fe077. Accessed 26 Aug 2020
Brownlee, J.: Better deep learning. Machine Learning Mastery (2018)
Medium, Towards Data Science: Understanding binary cross-entropy/log loss. https://towardsdatascience.com/understanding-binary-cross-entropy-log-loss-a-visual-explanation-a3ac6025181a. Accessed 31 Aug 2020
Pelatrion: Binary cross-entropy. https://peltarion.com/knowledge-center/documentation/modeling-view/build-an-ai-model/loss-functions/binary-crossentropy. Accessed 24 Aug 2020
Quora: What’s the difference between gradient descent and stochastic gradient descent? https://www.quora.com/Whats-the-difference-between-gradient-descent-and-stochastic-gradient-descent. Accessed 01 Aug 2020
Machine Learning Mastery: Difference between a batch and an epoch in a neural network. https://machinelearningmastery.com/difference-between-a-batch-and-an-epoch. Accessed 10 Aug 2020
Medium, Towards Data Science: Why using MSE for binary classification is a bad idea? https://towardsdatascience.com/why-using-mean-squared-error-mse-cost-function-for-binary-classification-is-a-bad-idea. Accessed 21 Nov 2016
Andonov, S., Dobreva, J., Lumburovska, L., Pavlov, S., Dimitrova, V., Popovska-Mitrovikj, A.: Application of machine learning in DES cryptanalysis. In: Dimitrova, V., Dimitrovski, I. (eds.) ICT-Innovations 2020, Web Proceedings, pp. 124–134 (2020)
Scikit-learn: Precision-Recall. https://scikit-learn.org/0.15/auto_examples/plot_precision_recall.html. Accessed 21 Nov 2016
Medium, Towards Data Science: The Artificial Neural Networks Handbook: Part 4. https://medium.com/@jayeshbahire/the-artificial-neural-networks-handbook-part-4-d2087d1f583e. Accessed 15 Aug 2020
Wikimedia Commons: File:sigmoid-function-2.svg. https://commons.wikimedia.org/wiki/File:Sigmoid-function-2.svg. Accessed 18 Aug 2020
Medium, Towards Data Science: ReLU: Not a differentiable function: why used in gradient based optimization? And other generalizations of ReLU. https://medium.com/@kanchansarkar/relu-not-a-differentiable-function-why-used-in-gradient-based-optimzation-7fef3a4cecec. Accessed 24 Aug 2020
De Luca, P., Galletti, A., Giunta, G., Marcellino, L.: Accelerated Gaussian convolution in a data assimilation scenario. In: Krzhizhanovskaya, V.V., et al. (eds.) ICCS 2020. LNCS, vol. 12142, pp. 199–211. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-50433-5_16
De Luca, P., Fiscale, S., Landolfi, L., Di Mauro, A.: Distributed genomic compression in mapreduce paradigm. In: Montella, R., Ciaramella, A., Fortino, G., Guerrieri, A., Liotta, A. (eds.) IDCS 2019. LNCS, vol. 11874, pp. 369–378. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-34914-1_35
Keras: The Functional API. https://keras.io/guides/functional_api/
Tensorflow: Tensorflow Core. https://www.tensorflow.org/overview
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Gjorgjievska Perusheska, M., Dimitrova, V., Popovska-Mitrovikj, A., Andonov, S. (2021). Application of Machine Learning in Cryptanalysis Concerning Algorithms from Symmetric Cryptography. In: Arai, K. (eds) Intelligent Computing. Lecture Notes in Networks and Systems, vol 285. Springer, Cham. https://doi.org/10.1007/978-3-030-80129-8_59
Download citation
DOI: https://doi.org/10.1007/978-3-030-80129-8_59
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-80128-1
Online ISBN: 978-3-030-80129-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)