International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112 | Views: 255

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 8, August 2014 | Popularity: 6.2 / 10


     

Review of a New Distinguishing Attack Using Block Cipher with a Neural Network

Vina M. Lomte, Archana D. Shinde


Abstract: This paper describes a new distinguishing type attack to identify block ciphers, which grounded in a neural network, by means of a linguistic approach and an information retrieval approach, from patterns which is found on a ciphertexts set collection. The ideas were performed on a set of ciphertexts, which were encrypted by the finalist algorithms of AES contest: MARS, RC6, Rijndael, Serpent and Twofish; each one has a unique 128-bit key. This experiment shows the processes of clustering and classification were successful, which allows the formation of well-formed and well-defined groups, here ciphertexts encrypted by the same algorithm stayed close to each other.


Keywords: Distinguishing attack, neural networks, cryptography, block ciphers


Edition: Volume 3 Issue 8, August 2014


Pages: 733 - 736



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Vina M. Lomte, Archana D. Shinde, "Review of a New Distinguishing Attack Using Block Cipher with a Neural Network", International Journal of Science and Research (IJSR), Volume 3 Issue 8, August 2014, pp. 733-736, URL: https://www.ijsr.net/getabstract.php?paperid=2015471, DOI: https://www.doi.org/10.21275/2015471



Downloads: 656 | Views: 2004

Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj


Downloads: 401 | Views: 722

Computer Science & Engineering, India, Volume 7 Issue 11, November 2018

Pages: 1951 - 1955

Hadoop Performance Improvement using Metadata and Securing with Oauth Token

Swapnali A. Salunkhe, Amol B. Rajmane


Downloads: 386 | Views: 703

Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1 - 3

Comparative Study of Conventional Desktop Computer and Compute Stick

Aadarsh Sooraj, Sooraj G.


Downloads: 354 | Views: 700

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 629 - 632

Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall


Downloads: 336 | Views: 690

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2148 - 2152

The Impact and Application of 3D Printing Technology

Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera


Top