Learning the enigma with recurrent neural networks

S Greydanus - arxiv preprint arxiv:1708.07576, 2017 - arxiv.org
Recurrent neural networks (RNNs) represent the state of the art in translation, image
captioning, and speech recognition. They are also capable of learning algorithmic tasks …

Research on plaintext restoration of AES based on neural network

X Hu, Y Zhao - Security and Communication Networks, 2018 - Wiley Online Library
Known plaintext attack is a common attack method in cryptographic attack. For ciphertext,
only known part of the plaintext but unknown key, how to restore the rest of the plaintext is an …

Artificial neural network for steganography

S Husien, H Badi - Neural Computing and Applications, 2015 - Springer
The digital information revolution has brought about changes in our society and our lives.
The many advantages of digital information have also generated new challenges and new …

[PDF][PDF] Applying neural networks for simplified data encryption standard (SDES) cipher system cryptanalysis.

KM Alallayah, AH Alhamami, W AbdElwahed… - Int. Arab J. Inf. Technol …, 2012 - iajit.org
The problem in cryptanalysis can be described as an unknown and the neural networks are
ideal tools for black-box system identification. In this paper, a mathematical black-box model …

Dual security method for digital image using HBV encryption and least significant bit steganography

A Susanto, EH Rachmawanto, CA Sari… - Journal of Physics …, 2019 - iopscience.iop.org
This study proposes a combination of two security techniques, namely steganography and
cryptography. The proposed steganography technique is LSB because it has advantages in …

Imperceptible and secure image watermarking using DCT and random spread technique

EH Rachmawanto, CA Sari… - … Electronics and Control), 2019 - telkomnika.uad.ac.id
Watermarking is a copyright protection technique, while cryptography is a message
encoding technique. Imperceptibility, robustness, and safety are aspects that are often …

Preimage attacks against lightweight scheme Xoodyak based on deep learning

G Liu, J Lu, H Li, P Tang, W Qiu - … : Proceedings of the 2021 Future of …, 2021 - Springer
With the rapid progress in the artificial intelligence field, machine learning algorithms have
been utilized to construct cryptographic schemes and conduct cryptanalysis. In this paper …

[PDF][PDF] Various approaches towards cryptanalysis

S Prajapat, RS Thakur - International Journal of Computer Applications, 2015 - Citeseer
Cryptanalysis is very important step for auditing and checking strength of any cryptosystem.
Some of these cryptosystem ensures confidentiality and security of large information …

Improved Color Image Encryption using Hybrid Modulus Substitution Cipher and Chaotic Method.

B Harjo… - International Journal of …, 2021 - search.ebscohost.com
This study proposes the hybrid substitution cryptography method followed by chaotic
methods to improve the security of digital image transactions on the internet. The substitution …

Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems

EH Riyadi, AE Putra, TK Priyambodo - PeerJ Computer Science, 2021 - peerj.com
Background Data transmissions using the DNP3 protocol over the internet in SCADA
systems are vulnerable to interruption, interception, fabrication, and modification through …