Skip to main content

Neuro-Cryptanalysis of DES and Triple-DES

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7667))

Abstract

In this paper, we apply a new cryptanalytic attack on DES and Triple-DES. The implemented attack is a known-plaintext attack based on neural networks. In this attack we trained a neural network to retrieve plaintext from ciphertext without retrieving the key used in encryption.

The attack was practically, and successfully, applied on DES and Triple-DES. This attack required an average of 211 plaintext-ciphertext pairs to perform cryptanalysis of DES in an average duration of 51 minutes. For the cryptanalysis of Triple-DES, an average of only 212 plaintext-ciphertext pairs was required in an average duration of 72 minutes. As compared to other attacks, this attack is an improvement in terms of number of known-plaintexts required, as well as the time required to perform the complete attack.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Albrecht, M., Cid, C.: Algebraic Techniques in Differential Cryptanalysis. In: Proceedings of the First International Conference on Symbolic Computation and Cryptography (2008)

    Google Scholar 

  2. Knudsen, L.R.: Block Ciphers - A Survey. In: Preneel, B., Rijmen, V. (eds.) State of the Art in Applied Cryptography. LNCS, vol. 1528, pp. 18–48. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  3. NIST, Data Encryption Standard (DES), FIPS PUB 46, Federal Information Processing Standards Publication 46, U.S. Department of Commerce (1977)

    Google Scholar 

  4. Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. Journal of Cryptology 4, 3–72 (1991)

    Article  MathSciNet  MATH  Google Scholar 

  5. NIST, Data Encryption Standard (DES), FIPS PUB 46–3, Federal Information Processing Standards Publication 46–3 (1999)

    Google Scholar 

  6. Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)

    Google Scholar 

  7. Biham, E., Shamir, A.: Differential Cryptanalysis of the Full 16-Round DES. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 487–496. Springer, Heidelberg (1993)

    Google Scholar 

  8. Langford, S.K.: Differential-Linear Cryptanalysis and Threshold Signatures. PhD thesis, Stanford University, USA (1995)

    Google Scholar 

  9. Biham, E.: New Types of Cryptanalytic Attacks Using Related Keys. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 398–409. Springer, Heidelberg (1994)

    Google Scholar 

  10. Merkle, R., Hellman, M.: On the Security of Multiple Encryption. Communications of the ACM 24, 465–467 (1981)

    Article  MathSciNet  Google Scholar 

  11. Diffie, W., Hellman, M.E.: Exhaustive Cryptanalysis of the NBS Data Encryption Standard. Computer 10, 4–84 (1977)

    Article  Google Scholar 

  12. Lucks, S.: Attacking Triple Encryption. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 239–253. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  13. Choi, J., Kim, J.-S., Sung, J., Lee, S.-J., Lim, J.-I.: Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 567–576. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  14. Clark, M., Blank, D.: A Neural-Network Based Cryptographic System. In: Procceedings of the 9th Midwest Artificial Intelligence and Cognitive Science Conference (MAICS 1998), pp. 91–94 (1998)

    Google Scholar 

  15. Godhavari, T., Alamelu, N.R., Soundararajan, R.: Cryptography Using Neural Network. In: Proceedings of 2005 Annual IEEE INDICON, pp. 258–261 (2005)

    Google Scholar 

  16. Kanter, K.W., Kanter, E.: Secure exchange of information by synchronization of neural networks. Europhysics Letters 57, 141 (2002)

    Article  Google Scholar 

  17. Klimov, A.B., Mityagin, A., Shamir, A.: Analysis of Neural Cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 288–298. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  18. Li, L., Lin, L., Hwang, M.: A remote password authentication scheme for multiserver architecture using neural networks. IEEE Transactions on Neural Networks 12, 1498–1504 (2001)

    Article  Google Scholar 

  19. Dourlens, S.: Neuro-Cryptography. MSc Thesis, Dept. of Microcomputers and Microelectronics, University of Paris, France (1995)

    Google Scholar 

  20. Li, S.: Analyses and New Designs of Digital Chaotic Ciphers. PhD thesis, School of Electronics and Information Engineering, Xi’an Jiaotong University, Xi’an, China (2003)

    Google Scholar 

  21. Li, C., Li, S., Zhang, D., Chen, G.: Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher. In: Proceedings of International Symposium on Neural Networks (2005)

    Google Scholar 

  22. Rao, K., Krishna, M., Babu, D.: Cryptanalysis of a Feistel Type Block Cipher by Feed Forward Neural Network Using Right Sigmoidal Signal. International Journal of Soft Computing 4, 131–135 (2009)

    Google Scholar 

  23. Alani, M.M.: Neurocryptanalysis of DES. In: Proceedings of World Congress on Internet Security. University of Guelph, Guelph (2012)

    Google Scholar 

  24. Hornik, K., Stinchcombe, M., White, H.: Multilayer Feedforward Neural Networks are Universal Approximators. Neural Networks 2, 359–366 (1989)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Alani, M.M. (2012). Neuro-Cryptanalysis of DES and Triple-DES. In: Huang, T., Zeng, Z., Li, C., Leung, C.S. (eds) Neural Information Processing. ICONIP 2012. Lecture Notes in Computer Science, vol 7667. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34500-5_75

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34500-5_75

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34499-2

  • Online ISBN: 978-3-642-34500-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics