Neural network based cryptanalysis of a feistel type block cipher

In this paper a new attack for block cipher based on the ability of neural networks to pe$orm an approximation of mapping is proposed. Feistel block cipher is explained and a brief about modern attacks is given. A complete problem formulation is explained and implementation of the attack on some hypothetical Feistel cipher is presented. Results and comments are given as appropriate.

[1]  C.A.L. Bailer-Jones,et al.  An introduction to artificial neural networks , 2001 .

[2]  Bart Kosko,et al.  Unsupervised learning in noise , 1990, International 1989 Joint Conference on Neural Networks.

[3]  Belur V. Dasarathy,et al.  Nosing Around the Neighborhood: A New System Structure and Classification Rule for Recognition in Partially Exposed Environments , 1980, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[4]  Howard M. Heys,et al.  A TUTORIAL ON LINEAR AND DIFFERENTIAL CRYPTANALYSIS , 2002, Cryptologia.

[5]  Sankar K. Pal,et al.  Self-organizing neural network as a fuzzy classifier , 1994, IEEE Trans. Syst. Man Cybern..

[6]  M. E. Johnson,et al.  Generalized simulated annealing for function optimization , 1986 .

[7]  Xuejia Lai Higher Order Derivatives and Differential Cryptanalysis , 1994 .

[8]  H. Feistel Cryptography and Computer Privacy , 1973 .

[9]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[10]  J. Hopfield,et al.  Computing with neural circuits: a model. , 1986, Science.

[11]  G. Barreto,et al.  A SELF-ORGANIZING NEURAL NETWORK , 2000 .

[12]  Donald Gustafson,et al.  Fuzzy clustering with a fuzzy covariance matrix , 1978, 1978 IEEE Conference on Decision and Control including the 17th Symposium on Adaptive Processes.

[13]  Philipp Slusallek,et al.  Introduction to real-time ray tracing , 2005, SIGGRAPH Courses.

[14]  Richard P. Lippmann,et al.  An introduction to computing with neural nets , 1987 .

[15]  S. Hyakin,et al.  Neural Networks: A Comprehensive Foundation , 1994 .

[16]  Lakhmi C. Jain,et al.  Self-Organizing Neural Networks , 2002 .

[17]  Lars R. Knudsen,et al.  Attacks on Block Ciphers of Low Algebraic Degree , 2001, Journal of Cryptology.

[18]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[19]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[20]  Teuvo Kohonen,et al.  An introduction to neural computing , 1988, Neural Networks.