Cryptanalysis and improvement of multimodal data encryption by
machine-learning-based system
- URL: http://arxiv.org/abs/2402.15779v1
- Date: Sat, 24 Feb 2024 10:02:21 GMT
- Title: Cryptanalysis and improvement of multimodal data encryption by
machine-learning-based system
- Authors: Zakaria Tolba
- Abstract summary: encryption algorithms to accommodate varied requirements of this field.
Best approach to analyzing an encryption algorithm is to identify a practical and efficient technique to break it.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: With the rising popularity of the internet and the widespread use of networks
and information systems via the cloud and data centers, the privacy and
security of individuals and organizations have become extremely crucial. In
this perspective, encryption consolidates effective technologies that can
effectively fulfill these requirements by protecting public information
exchanges. To achieve these aims, the researchers used a wide assortment of
encryption algorithms to accommodate the varied requirements of this field, as
well as focusing on complex mathematical issues during their work to
substantially complicate the encrypted communication mechanism. as much as
possible to preserve personal information while significantly reducing the
possibility of attacks. Depending on how complex and distinct the requirements
established by these various applications are, the potential of trying to break
them continues to occur, and systems for evaluating and verifying the
cryptographic algorithms implemented continue to be necessary. The best
approach to analyzing an encryption algorithm is to identify a practical and
efficient technique to break it or to learn ways to detect and repair weak
aspects in algorithms, which is known as cryptanalysis. Experts in
cryptanalysis have discovered several methods for breaking the cipher, such as
discovering a critical vulnerability in mathematical equations to derive the
secret key or determining the plaintext from the ciphertext. There are various
attacks against secure cryptographic algorithms in the literature, and the
strategies and mathematical solutions widely employed empower cryptanalysts to
demonstrate their findings, identify weaknesses, and diagnose maintenance
failures in algorithms.
Related papers
- Encrypted system identification as-a-service via reliable encrypted matrix inversion [0.0]
Encrypted computation opens up promising avenues across a plethora of application domains.
In particular, Arithmetic homomorphic encryption is a natural fit for cloud-based computational services.
This paper presents an encrypted system identification service enabled by a reliable encrypted solution to at least squares problems.
arXiv Detail & Related papers (2024-10-27T20:00:04Z) - Lightweight Cryptanalysis of IoT Encryption Algorithms : Is Quota Sampling the Answer? [0.0]
Two well-known lightweight algorithms are SIMON and SIMECK which have been specifically designed for use on resource-constrained IoT devices.
It is necessary to test these algorithms for resilience against differential cryptanalysis attacks.
In this paper, we introduce Versatile Investigative Sampling Technique for Advanced Cryptanalysis.
arXiv Detail & Related papers (2024-04-12T00:08:39Z) - SOCI^+: An Enhanced Toolkit for Secure OutsourcedComputation on Integers [50.608828039206365]
We propose SOCI+ which significantly improves the performance of SOCI.
SOCI+ employs a novel (2, 2)-threshold Paillier cryptosystem with fast encryption and decryption as its cryptographic primitive.
Compared with SOCI, our experimental evaluation shows that SOCI+ is up to 5.4 times more efficient in computation and 40% less in communication overhead.
arXiv Detail & Related papers (2023-09-27T05:19:32Z) - Feature Mining for Encrypted Malicious Traffic Detection with Deep
Learning and Other Machine Learning Algorithms [7.404682407709988]
The popularity of encryption mechanisms poses a great challenge to malicious traffic detection.
Traditional detection techniques cannot work without the decryption of encrypted traffic.
In this paper, we provide an in-depth analysis of traffic features and compare different state-of-the-art traffic feature creation approaches.
We propose a novel concept for encrypted traffic feature which is specifically designed for encrypted malicious traffic analysis.
arXiv Detail & Related papers (2023-04-07T15:25:36Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Application of Data Encryption in Chinese Named Entity Recognition [11.084360853065736]
We propose an encryption learning framework to address the problems of data leakage and inconvenient disclosure of sensitive data.
We introduce multiple encryption algorithms to encrypt training data in the named entity recognition task for the first time.
The experimental results show that the encryption method achieves satisfactory results.
arXiv Detail & Related papers (2022-08-31T04:20:37Z) - NEQRX: Efficient Quantum Image Encryption with Reduced Circuit Complexity [2.7985570786346745]
We propose an efficient implementation scheme for a quantum image encryption algorithm combining the generalized affine transform and logistic map.
We achieve a remarkable 50% reduction in cost while maintaining security and efficiency.
arXiv Detail & Related papers (2022-04-14T10:15:23Z) - Reinforcement Learning on Encrypted Data [58.39270571778521]
We present a preliminary, experimental study of how a DQN agent trained on encrypted states performs in environments with discrete and continuous state spaces.
Our results highlight that the agent is still capable of learning in small state spaces even in presence of non-deterministic encryption, but performance collapses in more complex environments.
arXiv Detail & Related papers (2021-09-16T21:59:37Z) - MixNet for Generalized Face Presentation Attack Detection [63.35297510471997]
We have proposed a deep learning-based network termed as textitMixNet to detect presentation attacks.
The proposed algorithm utilizes state-of-the-art convolutional neural network architectures and learns the feature mapping for each attack category.
arXiv Detail & Related papers (2020-10-25T23:01:13Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.