2018
DOI: 10.1155/2018/6868506
|View full text |Cite
|
Sign up to set email alerts
|

Research on Plaintext Restoration of AES Based on Neural Network

Abstract: Known plaintext attack is a common attack method in cryptographic attack. For ciphertext, only known part of the plaintext but unknown key, how to restore the rest of the plaintext is an important part of the known plaintext attack. This paper uses backpropagation neural networks to perform cryptanalysis on AES in an attempt to restore plaintext. The results show that the neural network can restore the entire byte with a probability of more than 40%, restoring more than half of the plaintext bytes with a proba… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(16 citation statements)
references
References 6 publications
0
16
0
Order By: Relevance
“…e number of differences is set as t � 3, and the threshold is set as δ > 0.5. e training sample size is 2 24 , and the testing sample size is 2 18 . e positive and negative samples in training set and testing set account for 1/2 of them, respectively.…”
Section: Results Of the Proposed Distinguishersmentioning
confidence: 99%
See 1 more Smart Citation
“…e number of differences is set as t � 3, and the threshold is set as δ > 0.5. e training sample size is 2 24 , and the testing sample size is 2 18 . e positive and negative samples in training set and testing set account for 1/2 of them, respectively.…”
Section: Results Of the Proposed Distinguishersmentioning
confidence: 99%
“…e authors in reference [23] evaluated the various relations between deep learning and cryptography and proposed some possible research directions of using deep learning in cryptanalysis. A feedforward neural network (FNN) was developed in reference [24], which can find plaintext from the ciphertext of AES without using key information.…”
Section: Related Workmentioning
confidence: 99%
“…The Half-Byte algorithm utilizes four left bits that are often the same sequentially especially in text files. For example in a text file containing the words "fetch", in hexadecimal and binary characters are translated as [7]: Compression with a half byte algorithm. The compression algorithm is: 1.…”
Section: Half-byte Algorithmmentioning
confidence: 99%
“…Thus, the required storage space capacity will be smaller and the time and cost of access becomes smaller as well [5]. Data compressing methods have evolved and each method has advantages and disadvantages, the capabilities of each method of data compressing are generally measured by parameters of size or capacity and compression speed, by compressing or shrinking the file size first, then the required storage capacity becomes smaller [7].…”
Section: Introductionmentioning
confidence: 99%
“…e authors in [26] used a neural network to find out the mapping relationship between plaintexts, ciphertexts, and the key in simplified DES (S-DES). e author in [27] developed a feedforward neural network that discovers the plaintext from the ciphertext without the key in the AES cipher. e authors in [28] attacked on the round-reduced Speck32/64 by using deep residual neural networks, where they trained the neural networks to distinguish the output of Speck with a given input difference based on the chosen plaintext attack.…”
Section: Related Workmentioning
confidence: 99%