2020
DOI: 10.1088/1612-202x/aba1f1
|View full text |Cite
|
Sign up to set email alerts
|

Novel fully convolutional network for cryptanalysis of cryptosystem by equal modulus decomposition

Abstract: The optical cryptosystem based on equal modulus decomposition (EMD) has attracted wide attention due to its remarkable anti-attack characteristics. In this paper, we propose a novel fully convolutional network model, which is an end-to-end deep learning method, to attack the EMD-based cryptosystem. The trained network model can retrieve plaintext after inputting many ciphertext-plaintext pairs and optimizing parameters. Numerical simulation results and analysis show that EMD-based cryptosystems by Fourier and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 40 publications
0
2
0
Order By: Relevance
“…Therefore, the proposed encryption scheme can resist CPA. Recently, some researchers have proposed CPA methods based on deep learning [39][40][41]. By inputting plaintext and corresponding ciphertext into the neural network, the encryption system can be broken.…”
Section: Chosen-plaintext Attackmentioning
confidence: 99%
“…Therefore, the proposed encryption scheme can resist CPA. Recently, some researchers have proposed CPA methods based on deep learning [39][40][41]. By inputting plaintext and corresponding ciphertext into the neural network, the encryption system can be broken.…”
Section: Chosen-plaintext Attackmentioning
confidence: 99%
“…Roughly speaking, cryptanalysis aims to test and analyze the security of cryptographic protocols by feeding different inputs to the cryptographic algorithm and analyzing the outputs in order to find a common or repetitive pattern in the outputs that might help find the secret key or even decrypt the ciphertext without access to the key. Machine learning can help learn from the data generated by the cryptographic algorithm and detect significant patterns [6]- [8] In late 90's and early 2000's, several cryptographic protocols using machine learning and deep learning models were proposed such as [9]- [11], but were deemed insecure and even some concrete attacks [12] were shown subsequently. The interest in neural network based cryptography took a dip because of the fact that simple computations, even as basic as exclusive-or (XOR) operation could not be computed by simple neural networks.…”
Section: Introductionmentioning
confidence: 99%