Review Papers | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014
Review of a New Distinguishing Attack Using Block Cipher with a Neural Network
Vina M. Lomte, Archana D. Shinde
This paper describes a new distinguishing type attack to identify block ciphers, which grounded in a neural network, by means of a linguistic approach and an information retrieval approach, from patterns which is found on a ciphertexts set collection. The ideas were performed on a set of ciphertexts, which were encrypted by the finalist algorithms of AES contest: MARS, RC6, Rijndael, Serpent and Twofish; each one has a unique 128-bit key. This experiment shows the processes of clustering and classification were successful, which allows the formation of well-formed and well-defined groups, here ciphertexts encrypted by the same algorithm stayed close to each other.
Keywords: Distinguishing attack, neural networks, cryptography, block ciphers
Edition: Volume 3 Issue 8, August 2014
Pages: 733 - 736
How to Cite this Article?
Vina M. Lomte, Archana D. Shinde, "Review of a New Distinguishing Attack Using Block Cipher with a Neural Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2015471, Volume 3 Issue 8, August 2014, 733 - 736
117 PDF Views | 95 PDF Downloads
Similar Articles with Keyword 'neural networks'
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021
Pages: 1673 - 1677Convolution Neural Network Based Image Recognition
Sofia Hamid, Mrigana Walia
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 1141 - 1146Offline Hindi Signature Recognition Using Surf Feature Extraction and Neural Networks Approach
Harpreet Kaur, Simarjeet Kaur
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 826 - 829Neural Systems Approach for Ammography Finding by Utilizing Wavelet Features
A. Mallareddy, A. Priyanka
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 1892 - 1896Review on Gait Recognition Using Artificial Intelligence
Drishty, Jasmeen Gill
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014
Pages: 609 - 612Review on Data Mining using Neural Network
Rasika Ashokrao Dugane, A. B. Raut
Similar Articles with Keyword 'cryptography'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2394 - 2397Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur