Deep-Learning-based Cryptanalysis through Topic Modeling

Authors

  • Kishore Kumar Amity Institute of Information Technology, Amity University, India
  • Sarvesh Tanwar Amity Institute of Information Technology, Amity University, India
  • Shishir Kumar School of Information Science and Technology, Babasaheb Bhimrao Ambedkar University, India
Volume: 14 | Issue: 1 | Pages: 12524-12529 | February 2024 | https://doi.org/10.48084/etasr.6515

Abstract

Neural cryptography is a technique that uses neural networks for secure data encryption. Cryptoanalysis, on the other hand, deals with analyzing and decrypting ciphers, codes, and encrypted text without using a real key. Chosen-plaintext cryptanalysis is a subfield of cryptanalysis where both plain text and ciphertext are available and the goal is either to find the encryption technique, the encryption key, or both. This study addresses chosen plaintext cryptanalysis within public key cryptography, to categorize topics of encrypted text. Using a fixed encryption technique and key, the focus was placed on creating a framework that identifies the topic associated with ciphertext, using diverse plaintexts and their corresponding cipher texts. To our knowledge, this is the first time that chosen-plaintext cryptanalysis has been discussed in the context of topic modeling. The paper used deep learning techniques such as CNNs, GRUs, and LSTMs to process sequential data. The proposed framework achieved up to 67% precision, 99% recall, 80% F1-score, and 71% AUPR on a dataset, showcasing promising results and opening avenues for further research in this cryptanalysis subarea.

Keywords:

cryptanalysis, chosen-plaintext cryptanalysis, deep learning, CNN, LSTM, GRU, topic modeling

Downloads

Download data is not yet available.

References

T. Dong and T. Huang, "Neural Cryptography Based on Complex-Valued Neural Network," IEEE Transactions on Neural Networks and Learning Systems, vol. 31, no. 11, pp. 4999–5004, Aug. 2020.

M. Gupta, M. Gupta, and M. Deshmukh, "Single secret image sharing scheme using neural cryptography," Multimedia Tools and Applications, vol. 79, no. 17, pp. 12183–12204, May 2020.

M. A. Al-Shabi, "A Survey on Symmetric and Asymmetric Cryptography Algorithms in information Security," International Journal of Scientific and Research Publications (IJSRP), vol. 9, no. 3, Mar. 2019, Art. no. p8779.

A. H. Al-Omari, "Lightweight Dynamic Crypto Algorithm for Next Internet Generation," Engineering, Technology & Applied Science Research, vol. 9, no. 3, pp. 4203–4208, Jun. 2019.

A. S. Alshammari, "Comparison of a Chaotic Cryptosystem with Other Cryptography Systems," Engineering, Technology & Applied Science Research, vol. 10, no. 5, pp. 6187–6190, Oct. 2020.

N. Carlini, M. Jagielski, and I. Mironov, "Cryptanalytic Extraction of Neural Network Models," in Advances in Cryptology – CRYPTO 2020, Santa Barbara, CA, USA, 2020, pp. 189–218.

E. Barkan, E. Biham, and N. Keller, "Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication," in Advances in Cryptology - CRYPTO 2003, Santa Barbara, CA, USA, 2003, pp. 600–616.

F. Wang, J. Sang, Q. Liu, C. Huang, and J. Tan, "A deep learning based known plaintext attack method for chaotic cryptosystem." arXiv, Mar. 09, 2021.

N. Munir, M. Khan, A. Al Karim Haj Ismail, and I. Hussain, "Cryptanalysis and Improvement of Novel Image Encryption Technique Using Hybrid Method of Discrete Dynamical Chaotic Maps and Brownian Motion," Multimedia Tools and Applications, vol. 81, no. 5, pp. 6571–6584, Feb. 2022.

A. M. Qadir and N. Varol, "A Review Paper on Cryptography," in 2019 7th International Symposium on Digital Forensics and Security (ISDFS), Barcelos, Portugal, Jun. 2019, pp. 1–6.

Y. Zhang and D. Xiao, "Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack," Nonlinear Dynamics, vol. 72, no. 4, pp. 751–756, Jun. 2013.

N. Q. Luc, T. T. Nguyen, D. H. Quach, T. T. Dao, and N. T. Pham, "Building Applications and Developing Digital Signature Devices based on the Falcon Post-Quantum Digital Signature Scheme," Engineering, Technology & Applied Science Research, vol. 13, no. 2, pp. 10401–10406, Apr. 2023.

V. H. Le, N. Q. Luc, T. T. Dao, and Q. T. Do, "Building an Application that reads Secure Information Stored on the Chip of the Citizen Identity Card in Vietnam," Engineering, Technology & Applied Science Research, vol. 13, no. 1, pp. 10100–10107, Feb. 2023.

Y. LeCun, Y. Bengio, and G. Hinton, "Deep learning," Nature, vol. 521, no. 7553, pp. 436–444, May 2015.

S. Sikdar and M. Kule, "Recent Trends in Cryptanalysis Techniques: A Review," in Proceedings of International Conference on Frontiers in Computing and Systems, Singapore, 2023, pp. 209–222.

Z. Li, F. Liu, W. Yang, S. Peng, and J. Zhou, "A Survey of Convolutional Neural Networks: Analysis, Applications, and Prospects," IEEE Transactions on Neural Networks and Learning Systems, vol. 33, no. 12, pp. 6999–7019, Sep. 2022.

J. Chung, C. Gulcehre, K. Cho, and Y. Bengio, "Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling." arXiv, Dec. 11, 2014.

G. Van Houdt, C. Mosquera, and G. Nápoles, "A review on the long short-term memory model," Artificial Intelligence Review, vol. 53, no. 8, pp. 5929–5955, Dec. 2020.

"IMDB Dataset of 50K Movie Reviews." https://www.kaggle.com/datasets/lakshmi25npathi/imdb-dataset-of-50k-movie-reviews.

J. J. Webster and C. Kit, "Tokenization as the initial phase in NLP," in Proceedings of the 14th conference on Computational linguistics -, Nantes, France, 1992, vol. 4, pp. 1106-1110.

K. Divya, B. S. Siddhartha, N. M. Niveditha, and B. M. Divya, "An Interpretation of Lemmatization and Stemming in Natural Language Processing," Journal of University of Shanghai for Science and Technology, vol. 22, no. 10, pp. 350–357, Oct. 2020.

K. W. Church, "Word2Vec," Natural Language Engineering, vol. 23, no. 1, pp. 155–162, Jan. 2017.

E. S. I. Harba, "Secure Data Encryption Through a Combination of AES, RSA and HMAC," Engineering, Technology & Applied Science Research, vol. 7, no. 4, pp. 1781–1785, Aug. 2017.

S. Heron, "Advanced Encryption Standard (AES)," Network Security, vol. 2009, no. 12, pp. 8–12, Dec. 2009.

H. Zodpe and A. Shaikh, "A Survey on Various Cryptanalytic Attacks on the AES Algorithm," International Journal of Next-Generation Computing, pp. 115–123, 2021.

K. P. Sinaga and M.-S. Yang, "Unsupervised K-Means Clustering Algorithm," IEEE Access, vol. 8, pp. 80716–80727, 2020.

U. Iftikhar, K. Asrar, M. Waqas, and S. A. Ali, "Evaluating the Performance Parameters of Cryptographic Algorithms for IOT-based Devices," Engineering, Technology & Applied Science Research, vol. 11, no. 6, pp. 7867–7874, Dec. 2021.

R. J. Rasras, Z. A. AlQadi, and M. R. A. Sara, "A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages," Engineering, Technology & Applied Science Research, vol. 9, no. 1, pp. 3681–3684, Feb. 2019.

Downloads

How to Cite

[1]
K. Kumar, S. Tanwar, and S. Kumar, “Deep-Learning-based Cryptanalysis through Topic Modeling”, Eng. Technol. Appl. Sci. Res., vol. 14, no. 1, pp. 12524–12529, Feb. 2024.

Metrics

Abstract Views: 65
PDF Downloads: 62

Metrics Information