Abstract
In this paper, we apply a new cryptanalytic attack on DES and Triple-DES. The implemented attack is a known-plaintext attack based on neural networks. In this attack we trained a neural network to retrieve plaintext from ciphertext without retrieving the key used in encryption.
The attack was practically, and successfully, applied on DES and Triple-DES. This attack required an average of 211 plaintext-ciphertext pairs to perform cryptanalysis of DES in an average duration of 51 minutes. For the cryptanalysis of Triple-DES, an average of only 212 plaintext-ciphertext pairs was required in an average duration of 72 minutes. As compared to other attacks, this attack is an improvement in terms of number of known-plaintexts required, as well as the time required to perform the complete attack.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Albrecht, M., Cid, C.: Algebraic Techniques in Differential Cryptanalysis. In: Proceedings of the First International Conference on Symbolic Computation and Cryptography (2008)
Knudsen, L.R.: Block Ciphers - A Survey. In: Preneel, B., Rijmen, V. (eds.) State of the Art in Applied Cryptography. LNCS, vol. 1528, pp. 18–48. Springer, Heidelberg (1998)
NIST, Data Encryption Standard (DES), FIPS PUB 46, Federal Information Processing Standards Publication 46, U.S. Department of Commerce (1977)
Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. Journal of Cryptology 4, 3–72 (1991)
NIST, Data Encryption Standard (DES), FIPS PUB 46–3, Federal Information Processing Standards Publication 46–3 (1999)
Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)
Biham, E., Shamir, A.: Differential Cryptanalysis of the Full 16-Round DES. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 487–496. Springer, Heidelberg (1993)
Langford, S.K.: Differential-Linear Cryptanalysis and Threshold Signatures. PhD thesis, Stanford University, USA (1995)
Biham, E.: New Types of Cryptanalytic Attacks Using Related Keys. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 398–409. Springer, Heidelberg (1994)
Merkle, R., Hellman, M.: On the Security of Multiple Encryption. Communications of the ACM 24, 465–467 (1981)
Diffie, W., Hellman, M.E.: Exhaustive Cryptanalysis of the NBS Data Encryption Standard. Computer 10, 4–84 (1977)
Lucks, S.: Attacking Triple Encryption. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 239–253. Springer, Heidelberg (1998)
Choi, J., Kim, J.-S., Sung, J., Lee, S.-J., Lim, J.-I.: Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 567–576. Springer, Heidelberg (2005)
Clark, M., Blank, D.: A Neural-Network Based Cryptographic System. In: Procceedings of the 9th Midwest Artificial Intelligence and Cognitive Science Conference (MAICS 1998), pp. 91–94 (1998)
Godhavari, T., Alamelu, N.R., Soundararajan, R.: Cryptography Using Neural Network. In: Proceedings of 2005 Annual IEEE INDICON, pp. 258–261 (2005)
Kanter, K.W., Kanter, E.: Secure exchange of information by synchronization of neural networks. Europhysics Letters 57, 141 (2002)
Klimov, A.B., Mityagin, A., Shamir, A.: Analysis of Neural Cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 288–298. Springer, Heidelberg (2002)
Li, L., Lin, L., Hwang, M.: A remote password authentication scheme for multiserver architecture using neural networks. IEEE Transactions on Neural Networks 12, 1498–1504 (2001)
Dourlens, S.: Neuro-Cryptography. MSc Thesis, Dept. of Microcomputers and Microelectronics, University of Paris, France (1995)
Li, S.: Analyses and New Designs of Digital Chaotic Ciphers. PhD thesis, School of Electronics and Information Engineering, Xi’an Jiaotong University, Xi’an, China (2003)
Li, C., Li, S., Zhang, D., Chen, G.: Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher. In: Proceedings of International Symposium on Neural Networks (2005)
Rao, K., Krishna, M., Babu, D.: Cryptanalysis of a Feistel Type Block Cipher by Feed Forward Neural Network Using Right Sigmoidal Signal. International Journal of Soft Computing 4, 131–135 (2009)
Alani, M.M.: Neurocryptanalysis of DES. In: Proceedings of World Congress on Internet Security. University of Guelph, Guelph (2012)
Hornik, K., Stinchcombe, M., White, H.: Multilayer Feedforward Neural Networks are Universal Approximators. Neural Networks 2, 359–366 (1989)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Alani, M.M. (2012). Neuro-Cryptanalysis of DES and Triple-DES. In: Huang, T., Zeng, Z., Li, C., Leung, C.S. (eds) Neural Information Processing. ICONIP 2012. Lecture Notes in Computer Science, vol 7667. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34500-5_75
Download citation
DOI: https://doi.org/10.1007/978-3-642-34500-5_75
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34499-2
Online ISBN: 978-3-642-34500-5
eBook Packages: Computer ScienceComputer Science (R0)