Automated Classical Cipher Emulation Attacks via Unified Unsupervised Generative Adversarial Networks

Author:

Park Seonghwan1ORCID,Kim Hyunil23ORCID,Moon Inkyu1ORCID

Affiliation:

1. Department of Robotics and Mechatronics Engineering, Daegu Gyeongbuk Institute of Science & Technology (DGIST), Deagu 42988, Republic of Korea

2. Department of Convergence Science, Kongju National University, Gongju 32588, Republic of Korea

3. Basic Science Research Institution, Kongju National University, Gongju 32588, Republic of Korea

Abstract

Cryptanalysis has been studied and gradually improved with the evolution of cryptosystems over past decades. Recently, deep learning (DL) has started to be used in cryptanalysis to attack digital cryptosystems. As computing power keeps growing, deploying DL-based cryptanalysis becomes feasible in practice. However, since these studies can analyze only one cipher type for one DL model learning, it takes a lot of time to analyze multi ciphers. In this paper, we propose a unified cipher generative adversarial network (UC-GAN), which can perform ciphertext-to-plaintext translations among multiple domains (ciphers) using only a single DL model. In particular, the proposed model is based on unified unsupervised DL for the analysis of classical substitutional ciphers. Simulation results have indicated the feasibility and good performance of the proposed approach. In addition, we compared our experimental results with the findings of conditional GAN, where plaintext and ciphertext pairs in only the single domain are given as training data, and with CipherGAN, which is cipher mapping between unpaired ciphertext and plaintext in the single domain, respectively. The proposed model showed more than 97% accuracy by learning only data without prior knowledge of three substitutional ciphers. These findings could open a new possibility for simultaneously cracking various block ciphers, which has a great impact on the field of cryptography. To the best of our knowledge, this is the first study of the cryptanalysis of multiple cipher algorithms using only a single DL model

Funder

Korea Government

Publisher

MDPI AG

Subject

Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Software

Reference43 articles.

1. Linear cryptanalysis and block cipher design in East Germany in the 1970s;Courtois;Cryptologia,2019

2. A survey on symmetric and asymmetric cryptography algorithms in information security;Int. J. Sci. Res. Publ. (IJSRP),2019

3. Aea-NCS: An audio encryption algorithm based on a nested chaotic system;Wu;Chaos Solitons Fractals,2022

4. EFR-CSTP: Encryption for face recognition based on the chaos and semi-tensor product theory;Gao;Inf. Sci.,2023

5. A novel dynamic attack on classical ciphers using an attention-based LSTM encoder-decoder model;Ahmadzadeh;IEEE Access,2021

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3