Neural cryptography: vulnerabilities and attack strategies

L. Beshaj, Gaurav Tyagi
{"title":"Neural cryptography: vulnerabilities and attack strategies","authors":"L. Beshaj, Gaurav Tyagi","doi":"10.1117/12.3013669","DOIUrl":null,"url":null,"abstract":"A number of research papers has been published using the architecture of adversarial neural networks to prove that communication between two neural net based on synchronized input can be achieved, and without knowledge of this synchronized information these systems can not be breached. In this paper we will try to evaluate these adversarial neural net architectures when a third party gain access to partial secret key, or a noisy secret key, or has knowledge about loss function, or loss values itself, or activation functions used during training of encryption layers. We explore the cryptanalysis side of it in which we will focus on vulnerabilities a neural-net based cryptography network can face. This can be used in future to improve the current neural net based cryptography architectures. In this paper we show that while the encryption key is necessary to decrypt the messages in neural network domain, the adversarial neural networks can occasionally decrypt messages or raise a concern which will require further training.","PeriodicalId":178341,"journal":{"name":"Defense + Commercial Sensing","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Defense + Commercial Sensing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.3013669","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

A number of research papers has been published using the architecture of adversarial neural networks to prove that communication between two neural net based on synchronized input can be achieved, and without knowledge of this synchronized information these systems can not be breached. In this paper we will try to evaluate these adversarial neural net architectures when a third party gain access to partial secret key, or a noisy secret key, or has knowledge about loss function, or loss values itself, or activation functions used during training of encryption layers. We explore the cryptanalysis side of it in which we will focus on vulnerabilities a neural-net based cryptography network can face. This can be used in future to improve the current neural net based cryptography architectures. In this paper we show that while the encryption key is necessary to decrypt the messages in neural network domain, the adversarial neural networks can occasionally decrypt messages or raise a concern which will require further training.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
神经密码学:漏洞和攻击策略
已经发表的一些研究论文利用对抗神经网络的架构证明,两个神经网络之间可以实现基于同步输入的通信,而如果不知道这些同步信息,这些系统就无法被攻破。在本文中,我们将尝试在第三方获得部分秘钥或噪声秘钥,或了解损失函数、损失值本身或加密层训练过程中使用的激活函数的情况下,对这些对抗性神经网络架构进行评估。我们将从密码分析的角度进行探讨,重点关注基于神经网络的密码学网络可能面临的漏洞。今后,我们可以利用这一点来改进当前基于神经网络的加密架构。本文表明,虽然在神经网络领域,加密密钥是解密信息的必要条件,但对抗性神经网络偶尔也会解密信息或引起关注,这就需要进一步的训练。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Enhanced robot state estimation using physics-informed neural networks and multimodal proprioceptive data Exploring MOF-based micromotors as SERS sensors Adaptive object detection algorithms for resource constrained autonomous robotic systems Adaptive SIF-EKF estimation for fault detection in attitude control experiments A homogeneous low-resolution face recognition method using correlation features at the edge
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1