Intelligent Systems for Information Security

by   Ayman M. Bahaa-Eldin, et al.

This thesis aims to use intelligent systems to extend and improve performance and security of cryptographic techniques. Genetic algorithms framework for cryptanalysis problem is addressed. A novel extension to the differential cryptanalysis using genetic algorithm is proposed and a fitness measure based on the differential characteristics of the cipher being attacked is also proposed. The complexity of the proposed attack is shown to be less than quarter of normal differential cryptanalysis of the same cipher by applying the proposed attack to both the basic Substitution Permutation Network and the Feistel Network. The basic models of modern block ciphers are attacked instead of actual cipher to prove that the attack is applicable to other ciphers vulnerable to differential cryptanalysis. A new attack for block cipher based on the ability of neural networks to perform an approximation of mapping is proposed. A complete problem formulation is explained and implementation of the attack on some hypothetical Feistel cipher not vulnerable to differential or linear attacks is presented. A new block cipher based on the neural networks is proposed. A complete cipher structure is given and a key scheduling is also shown. The main properties of neural network being able to perform mapping between large dimension domains in a very fast and a very small memory compared to S-Boxes is used as a base for the cipher.



There are no comments yet.


page 3

page 34


On the Differential Cryptanalysis of SEPAR Cipher

SEPAR is a lightweight cryptographic algorithm, designed to implement on...

Differential cryptanalysis of image cipher using block-based scrambling and image filtering

Recently, an image encryption algorithm using block-based scrambling and...

Cryptanalysis of a Chaos-Based Fast Image Encryption Algorithm for Embedded Systems

Fairly recently, a new encryption scheme for embedded systems based on c...

Investigations of c-Differential Uniformity of Permutations with Carlitz Rank 3

The c-differential uniformity is recently proposed to reflect resistance...

Deep Learning based Differential Distinguisher for Lightweight Block Ciphers

Recent years have seen an increasing involvement of Deep Learning in the...

A Genetic Algorithm Enabled Similarity-Based Attack on Cancellable Biometrics

Cancellable biometrics (CB) as a means for biometric template protection...

On the primitivity of Lai-Massey schemes

In symmetric cryptography, the round functions used as building blocks f...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.