Review Papers | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014
Review of a New Distinguishing Attack Using Block Cipher with a Neural Network
Vina M. Lomte, Archana D. Shinde
This paper describes a new distinguishing type attack to identify block ciphers, which grounded in a neural network, by means of a linguistic approach and an information retrieval approach, from patterns which is found on a ciphertexts set collection. The ideas were performed on a set of ciphertexts, which were encrypted by the finalist algorithms of AES contest: MARS, RC6, Rijndael, Serpent and Twofish; each one has a unique 128-bit key. This experiment shows the processes of clustering and classification were successful, which allows the formation of well-formed and well-defined groups, here ciphertexts encrypted by the same algorithm stayed close to each other.
Keywords: Distinguishing attack, neural networks, cryptography, block ciphers
Edition: Volume 3 Issue 8, August 2014
Pages: 733 - 736
How to Cite this Article?
Vina M. Lomte, Archana D. Shinde, "Review of a New Distinguishing Attack Using Block Cipher with a Neural Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2015471, Volume 3 Issue 8, August 2014, 733 - 736
117 PDF Views | 95 PDF Downloads
Similar Articles with Keyword 'neural networks'
Convolution Neural Network Based Image Recognition
Sofia Hamid, Mrigana Walia
Offline Hindi Signature Recognition Using Surf Feature Extraction and Neural Networks Approach
Harpreet Kaur, Simarjeet Kaur
Neural Systems Approach for Ammography Finding by Utilizing Wavelet Features
A. Mallareddy, A. Priyanka
Review on Gait Recognition Using Artificial Intelligence
Drishty, Jasmeen Gill
Review on Data Mining using Neural Network
Rasika Ashokrao Dugane, A. B. Raut
Similar Articles with Keyword 'cryptography'
Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur