Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.12188/22790
DC FieldValueLanguage
dc.contributor.authorGjorgjievska Perusheska, Milenaen_US
dc.contributor.authorMihajloska Trpcheska, Hristinaen_US
dc.contributor.authorDimitrova, Vesnaen_US
dc.date.accessioned2022-09-02T08:32:00Z-
dc.date.available2022-09-02T08:32:00Z-
dc.date.issued2022-
dc.identifier.urihttp://hdl.handle.net/20.500.12188/22790-
dc.description.abstractWith the advent of machine learning and the development of powerful machines, the problem of decryption takes on a new light and opens new avenues for research. The remarkable rise of technologies and algorithms contributes to the widespread use of machine learning in various cases. One of the uses is in cryptanalysis and attack of algorithms used in cryptographic processes. In this paper, we elaborate the idea by using the deep neural network to perform the known-plaintext attack on AES to restore as many bits as possible, on the given plaintext. Moreover, we perform our experiments on different key sizes and different modes of operation on AES. The results show that the deep neural network can restore the bits in the whole data set with a probability of more than 98%, restore two consecutive bytes with more than 70%, and more than half of the plaintext bytes with a probability of 99%.en_US
dc.publisherSpringeren_US
dc.subjectCryptography, Cryptology, Cryptanalysis, Machine Learning, Deep Neural Networken_US
dc.titleDeep Learning-based Cryptanalysis of Different AES Modes of Operationen_US
dc.typeProceeding articleen_US
dc.relation.conferenceFICC 2022en_US
item.grantfulltextopen-
item.fulltextWith Fulltext-
crisitem.author.deptFaculty of Computer Science and Engineering-
Appears in Collections:Faculty of Computer Science and Engineering: Conference papers
Files in This Item:
File Description SizeFormat 
SAIC_MilenaGjP_final.docx.pdf559.93 kBAdobe PDFView/Open
Show simple item record

Page view(s)

201
checked on May 13, 2024

Download(s)

319
checked on May 13, 2024

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.