Presentation + Paper
6 June 2024 Neural cryptography: vulnerabilities and attack strategies
Lubjana Beshaj, Gaurav Tyagi
Author Affiliations +
Abstract
A number of research papers has been published using the architecture of adversarial neural networks to prove that communication between two neural net based on synchronized input can be achieved, and without knowledge of this synchronized information these systems can not be breached. In this paper we will try to evaluate these adversarial neural net architectures when a third party gain access to partial secret key, or a noisy secret key, or has knowledge about loss function, or loss values itself, or activation functions used during training of encryption layers. We explore the cryptanalysis side of it in which we will focus on vulnerabilities a neural-net based cryptography network can face. This can be used in future to improve the current neural net based cryptography architectures. In this paper we show that while the encryption key is necessary to decrypt the messages in neural network domain, the adversarial neural networks can occasionally decrypt messages or raise a concern which will require further training.
Conference Presentation
© (2024) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Lubjana Beshaj and Gaurav Tyagi "Neural cryptography: vulnerabilities and attack strategies", Proc. SPIE 13058, Disruptive Technologies in Information Sciences VIII, 130580S (6 June 2024); https://doi.org/10.1117/12.3013669
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Neural networks

Artificial neural networks

Cryptography

Cryptanalysis

Symmetric key encryption

Network security

Back to Top