Skip to main content

Application of Machine Learning in Cryptanalysis Concerning Algorithms from Symmetric Cryptography

  • Conference paper
  • First Online:
Intelligent Computing

Abstract

As machine learning is used to analyse data and produce some action based on that data, the application in the domain of cryptanalysis opens new points of view, since the key space of any complex cipher system is large. When concerning machine learning with the algorithms of cryptography, the possibility to learn from the experience that is provided by information retrieval, is being considered. With the understanding that cryptanalysis can be used for improvement and producing more complex solutions in the field of cryptography, common features are sought between these three fields. This paper aims to present the application of machine learning in the field of cryptanalysis, as a prime step for auditing and checking the strength of cryptosystems. Some of these cryptosystems ensure confidentiality and security of a variety of information exchanged from source to destination using symmetric key cryptography. Accordingly, understanding how the algorithms are maintaining the stability is the fundamental aspect for proceeding with the analysis. The experimental part of this paper provides a solution for application of neural networks in cryptanalysis. We show that AES with ECB mode is vulnerable to ciphertext-plaintext attacks. The analysis is focused on trying different sizes of keys for obtaining the ciphertexts from plaintexts. At the end, we discuss how that is impacting the difficulty of data reveal by decrypting with DNN (Artificial Neural Network).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Jayachandiran, K.: A machine learning approach for cryptanalysis. Department of Computer Science, Golisano College of Computing and Information Sciences, Rochester Institute of Technology, Rochester, NY (2018)

    Google Scholar 

  2. Alani, M.M.: Neuro-cryptanalysis of DES and triple-DES. In: Huang, T., Zeng, Z., Li, C., Leung, C.S. (eds.) ICONIP 2012. LNCS, vol. 7667, pp. 637–646. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34500-5_75

    Chapter  Google Scholar 

  3. Moore’s Law: Investopedia. https://www.investopedia.com/terms/m/mooreslaw. Accessed 01 Aug 2020

  4. De Cannière, C., Biryukov, A., Preneel, B.: An introduction to block cipher cryptanalysis. Proc. IEEE 94(2), 346–356 (2006)

    Article  Google Scholar 

  5. Lagerhjelm, L.: Extracting information from encrypted data using deep neural networks. Master paper, Department of Applied Physics and Electronics, Umeå University (2019)

    Google Scholar 

  6. Al-Janabi, S.T., Al-Khateeb, B., Abd, A. J.: Intelligent techniques in cryptanalysis: review and future directions. UHD J. Sci. Technol. 1, 1–10 (2017). University of Human Development Sulaimaniya, KRG-Iraq

    Google Scholar 

  7. Rivest, R.L.: Cryptography and machine learning. In: Imai, H., Rivest, R.L., Matsumoto, T. (eds.) ASIACRYPT 1991. LNCS, vol. 739, pp. 427–439. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-57332-1_36

    Chapter  Google Scholar 

  8. Focardi, R., Luccio, F.L.: Neural cryptanalysis of classical ciphers. In: Proceedings of the 19th Italian Conference on Theoretical Computer Science, ICTCS 2018, pp. 104–115. Department of Pure and Applied Sciences, University of Urbino Carlo Bo, Urbino, Italy (2018)

    Google Scholar 

  9. Alkhzaimi, H.A.: Cryptanalysis of selected block ciphers. Department of Mathematics and Computer Science-COMPUTE, The Technical University of Denmark, Denmark (2014)

    Google Scholar 

  10. Xinyi Hu, X., Zhao, Y.: Research on plaintext restoration of AES based on neural network. Secur. Commun. Net. 2018 (2018). Article ID 6868506 (2018)

    Google Scholar 

  11. TechTarget Search Security: Cryptology. https://searchsecurity.techtarget.com/definition/cryptology. Accessed 20 Sept 2020

  12. TechTarget Search Security: Cryptography. https://searchsecurity.techtarget.com/definition/cryptography. Accessed 12 Sept 2020

  13. Infosec Insights: 5 Differences between symmetric vs asymmetric encryption. https://sectigostore.com/blog/5-differences-between-symmetric-vs-asymmetric-encryption/. Accessed 06 Aug 2020

  14. Geeks for Geeks: Difference between private key and public key. https://www.geeksforgeeks.org/difference-between-private-key-and-public-key. Accessed 02 Aug 2020

  15. Geeks for Geeks: Difference between block cipher and stream cipher. https://www.geeksforgeeks.org/difference-between-block-cipher-and-stream-cipher/. Accessed 18 July 2020

  16. YouTube: Computerphile, AES explained (advanced encryption standard). https://www.youtube.com/watch?v=O4xNJsjtN6E. Accessed 21 Aug 2020

  17. ATP: AES. https://www.atpinc.com/blog/what-is-aes-256-encryption. Accessed 28 July 2020

  18. Comparitech: What is AES encryption and how does it work? https://www.comparitech.com/blog/information-security/what-is-aes-encryption/. Accessed 21 Aug 2020

  19. Wikipedia: Advanced encryption standard. https://en.wikipedia.org/wiki/Advanced_Encryption_Standard. Accessed 31 Aug 2016

  20. TechTarget Search Security: Cryptanalysis. https://searchsecurity.techtarget.com/definition/cryptanalysis. Accessed 22 Aug 2020

  21. ScienceDirect: Cryptanalysis. https://www.sciencedirect.com/topics/computer-science/cryptanalysis. Accessed 10 Sept 2020

  22. Britannica: Cryptanalysis. https://www.britannica.com/topic/cryptology/Cryptanalysis. Accessed 07 Aug 2020

  23. Chio, C., Freeman, D.: Machine Learning & Security: Protecting Systems with Data and Algorithms, 1st edn. O’Reilly Media, Incorporated, Sebastopol (2018)

    Google Scholar 

  24. Yegnanarayana, B.: Artificial neural networks for pattern recognition. Department of Computer Science and Engineering, Indian Institute of Technology, Madras, India (1993)

    Google Scholar 

  25. Meduim, Towards Data Science: Supervised vs. unsupervised learning. https://towardsdatascience.com/supervised-vs-unsupervised-learning-14f68e32ea8d. Accessed 26 Aug 2020

  26. Meduim, Towards Data Science: Neural Networks from Scratch with Python Code and Math in Detail—I. https://medium.com/towards-artificial-intelligence/building-neural-networks-from-scratch-with-python-code-and-math-in-detail-i-536fae5d7bbf. Accessed 27 July 2020

  27. Kaggle: IMDB dataset (Sentiment analysis) in CSV format. https://www.kaggle.com/columbine/imdb-dataset-sentiment-analysis-in-csv-format. Accessed 20 Aug 2020

  28. Meduim, Towards Data Science: The mathematic behind deep learning. https://towardsdatascience.com/the-mathematics-behind-deep-learning-f6c35a0fe077. Accessed 26 Aug 2020

  29. Brownlee, J.: Better deep learning. Machine Learning Mastery (2018)

    Google Scholar 

  30. Medium, Towards Data Science: Understanding binary cross-entropy/log loss. https://towardsdatascience.com/understanding-binary-cross-entropy-log-loss-a-visual-explanation-a3ac6025181a. Accessed 31 Aug 2020

  31. Pelatrion: Binary cross-entropy. https://peltarion.com/knowledge-center/documentation/modeling-view/build-an-ai-model/loss-functions/binary-crossentropy. Accessed 24 Aug 2020

  32. Quora: What’s the difference between gradient descent and stochastic gradient descent? https://www.quora.com/Whats-the-difference-between-gradient-descent-and-stochastic-gradient-descent. Accessed 01 Aug 2020

  33. Machine Learning Mastery: Difference between a batch and an epoch in a neural network. https://machinelearningmastery.com/difference-between-a-batch-and-an-epoch. Accessed 10 Aug 2020

  34. Medium, Towards Data Science: Why using MSE for binary classification is a bad idea? https://towardsdatascience.com/why-using-mean-squared-error-mse-cost-function-for-binary-classification-is-a-bad-idea. Accessed 21 Nov 2016

  35. Andonov, S., Dobreva, J., Lumburovska, L., Pavlov, S., Dimitrova, V., Popovska-Mitrovikj, A.: Application of machine learning in DES cryptanalysis. In: Dimitrova, V., Dimitrovski, I. (eds.) ICT-Innovations 2020, Web Proceedings, pp. 124–134 (2020)

    Google Scholar 

  36. Scikit-learn: Precision-Recall. https://scikit-learn.org/0.15/auto_examples/plot_precision_recall.html. Accessed 21 Nov 2016

  37. Medium, Towards Data Science: The Artificial Neural Networks Handbook: Part 4. https://medium.com/@jayeshbahire/the-artificial-neural-networks-handbook-part-4-d2087d1f583e. Accessed 15 Aug 2020

  38. Wikimedia Commons: File:sigmoid-function-2.svg. https://commons.wikimedia.org/wiki/File:Sigmoid-function-2.svg. Accessed 18 Aug 2020

  39. Medium, Towards Data Science: ReLU: Not a differentiable function: why used in gradient based optimization? And other generalizations of ReLU. https://medium.com/@kanchansarkar/relu-not-a-differentiable-function-why-used-in-gradient-based-optimzation-7fef3a4cecec. Accessed 24 Aug 2020

  40. De Luca, P., Galletti, A., Giunta, G., Marcellino, L.: Accelerated Gaussian convolution in a data assimilation scenario. In: Krzhizhanovskaya, V.V., et al. (eds.) ICCS 2020. LNCS, vol. 12142, pp. 199–211. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-50433-5_16

    Chapter  Google Scholar 

  41. De Luca, P., Fiscale, S., Landolfi, L., Di Mauro, A.: Distributed genomic compression in mapreduce paradigm. In: Montella, R., Ciaramella, A., Fortino, G., Guerrieri, A., Liotta, A. (eds.) IDCS 2019. LNCS, vol. 11874, pp. 369–378. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-34914-1_35

    Chapter  Google Scholar 

  42. Keras: The Functional API. https://keras.io/guides/functional_api/

  43. Tensorflow: Tensorflow Core. https://www.tensorflow.org/overview

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Milena Gjorgjievska Perusheska .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gjorgjievska Perusheska, M., Dimitrova, V., Popovska-Mitrovikj, A., Andonov, S. (2021). Application of Machine Learning in Cryptanalysis Concerning Algorithms from Symmetric Cryptography. In: Arai, K. (eds) Intelligent Computing. Lecture Notes in Networks and Systems, vol 285. Springer, Cham. https://doi.org/10.1007/978-3-030-80129-8_59

Download citation

Publish with us

Policies and ethics