Computer Science ›› 2022, Vol. 49 ›› Issue (9): 288-296.doi: 10.11896/jsjkx.220300053
• Information Security • Previous Articles Next Articles
NING Han-yang1, MA Miao1,2, YANG Bo1, LIU Shi-chang1
CLC Number:
[1]XIANG J Z.Using legalization to promote password intelligence to achieve the credibility of active immunization-an exclusive interview with Shen Changxiang,a member of the Chinese Academy of Engineering and a cryptologist[J].China Information Security,2019,119(11):65-68. [2]SHANNON C E.Communication theory of secrecy systems[J].Bell System Technical Journal,1949,28(4):656-715. [3]WANG B C,JIA W J,CHEN Y G.Status quo,Application and trend of cryptography[J].Radio Communications Technology,2019,45(1):1-8. [4]FENG D G.Research on theory and approach of provable secu-rity[J].Journal of Software,2005,16(10):1743-1756. [5]KERCKHOFFS A.La cryptographie militaire[J].Des Sciences Militaires,1883,IX:5-38. [6]KOCHER P,JAFFE J,JUN B.Differential power analysis[C]//Proceedings of the Cryptology.1999:789-789. [7]KNUDSEN L R,ROBSHAW M J B,WAGNER D.Truncated differentials and skipjack[C]//Proceedings of CRYPTO.1999:165-180. [8]GOODFELLOW I,POUGET-ABADIE J,MIRZA M,et al.Ge-nerative adversarial nets[C]//Proceedings of the 27th Confe-rence on Advances in Neural Information Processing Systems.2014:2672-2680. [9]RIVEST R L.Cryptography andmachine learning[C]//Procee-dings of Advances in Cryptology.1991:427-439. [10]JOLLANDA S.Some applications of machine learning in cryptography[C]//Proceedings of ICSNS-VIII.2020:1-9. [11]ALANI M M.Applications of machine learning in cryptography:a survey[C]//Proceedings of the 3rd International Confe-rence on Cryptography,Security and Privacy.2019:23-27. [12]PATTANAYAK S,LUDWIG S A.Encryption based on neuralcryptography[C]//Proceedings of the International Conference on Hybrid Intelligent Systems.2017:1-4. [13]KINZEL W,KANTER I.Neural cryptography[C]//Procee-dings of the 9th International Conference on Neural Information Processing.2002:1351-1354. [14]ROSEN Z M,KLEIN E,KANTER I,et al.Mutual learning in a tree parity machine and its application to cryptography[J].Physical Review E Statistical Nonlinear & Soft Matter Physics,2002,66(6):66-135. [15]KLEIN E,MISLOVATY R,KANTER I,et al.Synchronization of neural networks by mutual learning and its application to cryptography[C]//Proceedings of the Neural Information Processing Systems.2005:689-696. [16]CHAKRABORTY S,DALAL J,SARKAR B,et al.Neural synchronization based secret key exchange over public channels:a survey[C]//Proceedings of the International Conference on Signal Propagation and Computer Technology.2014:368-375. [17]JAYANTA K P,MANDAL J K.A random block length based cryptosystem through multiple cascaded permutation combinations and chaining of blocks[C]//Proceedings of the Interna-tional Conference on Industrial and Information Systems(ICIIS).2009:26-31. [18]MANDAL J K,SARKAR A.An adaptive neural network guided secret key based encryption through recursive positional modulo-2 substitution for online wireless communication[C]//Proceedings of the International Conference on Recent Trends in Information Technology.2011:107-112. [19]MISLOVATY R,PERCHENOK Y,KANTER I,et al.Securekey-exchange protocol with an absence of injective functions[J].Physical Review E,2002,66(6):102-107. [20]LIANG Y.Design and analysis of neural key-exchange protocol[D].Chongqing:Chongqing University,2014. [21]LI L,ZHOU S.Research on key agreement algorithm based on neural network synchronization[J].Journal of Chongqing University of Technology(Natural Sciences Edition),2015,29(8):104-110. [22]ZHANG L,LIU F,DONG T,et al.Neural cryptography algorithm based on “Do not Trust My Partner” and fast learning rule[J].Journal of Computer Applications,2015,35(6):1683-1687. [23]DOROKHIN E S,FUERTES W,LASCANO E.On the development of an optimal structure of tree parity machine for the establishment of a cryptographic key[J/OL].Security and Communication Networks,2019:1-10.https://www.hindawi.com/journals/scn/2019/8214681/. [24]TAO D,HUANG T.Neural cryptography based on complex-valued neural network[J].IEEE Transactions on Neural Networks and Learning Systems,2019,31(11):1-6. [25]SARKAR A,KHAN M Z,SINGH M M,et al.Artificial neural synchronization using nature inspired whale optimization[J].IEEE Access,2021,9:16435-16447. [26]JEONG S,PARK C,HONG D,et al.Neural cryptography based on generalized tree parity machine for real-life systems[J].Security and Communication Networks,2021,2021(11):1-12. [27]ABADI M,ANDERSEN D G.Learning to protect communications with adversarial neural cryptography[C]//Proceedings of the International Conference on Learning Representations.2016:1-15. [28]COUTINHO M,DE OLIVEIRA ALBUQUERQUE R,BORGES F,et al.Learning perfectly secure cryptography to protect communications with adversarial neural cryptography[J].Sensors,2018,18(5):1306. [29]ZHOU X,WANG C,JING X.Componential design of crypto-graphic algorithm based on generative adversarial method[J].Journal of Beijing Electronic Science and Technology Institute,2020,28(4):1-15. [30]YAN X,CUI B,XU Y,et al.A method of information protection for collaborative deep learning under GAN model attack[J].IEEE-ACM Transactions on Computational Biology and Bioinformatics,2021,18(3):871-881. [31]DING Y,WU G,CHEN D,et al.DeepEDN:A deep-learning-based image encryption and decryption network for Internet of medical things[J].IEEE Internet of Things Journal,2021,8(3):1504-1518. [32]WU J,XIA W,ZHU G,et al.Image encryption based on adversarial neural cryptography and SHA controlled chaos[J].Journal of Modern Optics,2021,68(8):409-418. [33]ZHANG H,ZHOU S B.Application of chaos theory in cryptography[J].Journal of Chongqing University,2004,27(4):39-43. [34]SU S,LIN A,YEN J C.Design and realization of a new chaotic neural encryption decryption network[C]//Proceedings of the IEEE Asia-Pacific Conference on Circuits and Systems.Electronic Communication Systems,2000:335-338. [35]LIU N,DONG H.Security analysis of public-key encryptionscheme based on neural networks and its implementing[C]//Proceedings of the International Conference on Computational Intelligence and Security.2006:1327-1330. [36]ZOU A,XIU X.An asynchronous encryption arithmetic based on laguerre chaotic neural networks[C]//Proceedings of the WRI Global Congress on Intelligent Systems.2009:36-39. [37]XIAO C L,SUN Y,LIN B J,et al.Double encryption method based on neural network and composite discrete chaotic system[J].Journal of Electronics & Information Technology,2020,42(3):687-694. [38]FANG P,LIU H,WU C.A novel chaotic block image encryption algorithm based on deep convolutional generative adversa-rial networks[J].IEEE Access,2021,9:18497-18517. [39]ARVANDI M,WU S,SADEGHIAN A,et al.Symmetric cipher design using recurrent neural networks[C]//Proceedings of the IEEE International Joint Conference on Neural Network.2006:2039-2046. [40]ARVANDI M,WU S,SADEGHIAN A.On the use of recurrent neural networks to design symmetric ciphers[J].IEEE Computational Intelligence Magazine,2008,3(2):42-53. [41]SHI J,CHEN S,LU Y,et al.An approach to cryptographybased on continuous-variable quantum neural network[J].Scientific Reports,2020,10(7):2107-2120. [42]SAGAR V,KUMAR K.A symmetric key cryptographic algorithm using counter propagation network[C]//Proceedings of the ACM sponsored International Conference on Information and Communication Technology for Competitive Strategies.2014:1-5. [43]LU X,CHEN Y,LI X.Hierarchical Recurrent Neural Hashing for Image Retrieval with Hierarchical Convolutional Features[J].IEEE Transactions on Image Processing,2018,27(1):106-120. [44]LU H,ZHANG M,XU X,et al.Deep Fuzzy Hashing Network for Efficient Image Retrieval[J].IEEE Transactions on Fuzzy Systems,2021,29(1):166-176. [45]BACKES M,DURMUTH M,GERLING S,et al.Acoustic side-channel attacks on printers[C]//Proceedings of the USENIX Security symposium.2010:307-322. [46]HOSPODAR G,GIERLICHS B,DE MULDER E,et al.Ma-chine learning in side-channel analysis:a first study[J].Journal of Cryptographic Engineering,2011,1(4):293-300. [47]HEUSER A,ZOHNER M.Intelligent machine homicide[C]//Proceedings of International Workshop on Constructive Side-Channel Analysis and Secure Design.2012:249-264. [48]BARKEWITZ T,LEMKERUST K.Efficient template attacksbased on probabilistic multi-class support vector machines[C]//Proceedings of International Conference on Smart Card Research and Advanced Applications.2012:263-276. [49]LERMAN L,BONTEMPI G,MARKOWITHCH O.A machine learning approach against a masked AES[J].Journal of Cryptographic Engineering,2015,5(2):123-139. [50]PANCHENKO A,NIESSEN L,ZINNEN A,et al.Website finger-printing in onion routing based anonymization networks[C]//Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society.2011:103-114. [51]CAI X,ZHANG X C,JOSHI B,et al.Touching from a distance:website fingerprinting attacks and defenses[C]//Proceedings of the 2012 ACM Conference on Computer and Communications Security.2012:605-616. [52]WANG T,GOLDBERG I.Improved website fingerprinting on Tor[C]//Proceedings of the 12th Annual ACM Workshop on Privacy in the Electronic Society.2013:201-212. [53]WANG T,CAI X,NITHYA NANG R,et al.Effective attacks and provable defenses for website finger-printing[C]//Procee-dings of the 23rd USENIX Security Symposium.USENIX Association,2014:143-157. [54]HAYES J,DANEZIS G.K-fingerprinting:a robust scalablewebsite fingerprinting technique[C]//Proceedings of the 25rd USENIX Security Symposium.2016:1187-1203. [55]WANG K,YAN Y J,GUO P F,et al.Research on power analysis attack based on improved residual network and data augmentation technology[J].Journal of Cryptologic Research,2020,7(4):551-564. [56]MARTINASEK Z,HAJNY J,MALINA L.Optimization ofpower analysis using neural network[C]//Proceeding of the International Conference on Smart Card Research and Advanced Applications.2013:94-107. [57]CAGLI E,DUMAS C,PROUFF E.Convolutional neural networks with data augmentation against jitter-based counter measures[C]//Proceeding of the Cryptographic Hardware and Embedded Systems.2017:45-68. [58]TIMON B.Non-profiled deep learning-based side-channel at-tacks with sensitivity analysis[J].IACR Transactions on Cryptographic Hardware and Embedded Systems,2019(2):107-131. [59]RIMMER V,PREUVENEERS D,JUAREZ M,et al.Automated website fingerprinting through deep learning[C]//Procee-dings of the 25th Annual Network and Distributed System Secu-rity Symposium.2018:1-15. [60]SIRINAM P,IMANI M,JUAREZ M,et al.Deep fingerprinting:undermining website fingerprinting defenses with deep learning[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.2018:1928-1943. [61]BHAT S,LU D,KWON A,et al.Var-CNN:A data-efficientwebsite fingerprinting attack based on deep learning[J].Proceedings on Privacy Enhancing Technologies,2019(4):292-310. [62]RAHMAN M S,SIRINAM P,MATTHEWS N,et al.Tik-Tok:the utility of packet timing in website fingerprinting attacks[C]//Proceeding of the Privacy Enhancing Technologies.2020:1-20. [63]ALANI M M.Neuro-Cryptanalysis of DES and Triple-DES[C]//Proceeding of the International Conference on Neural Information Processing.2012:637-646. [64]JAYACHANDIRAN K.A machine learning approach for cryptanalysis[R/OL].Rocheste:Rochester Institute of Technology,2018.https://www.semanticscholar.org/paper/A-Machine-Lear-ning-Approach-for-Cryptanalysis-Jayachandiran/e1616cdb40415a6444a4b2dbfbf197d60bcc43d3#:~:text=%EE%80%80A%20Machine%20Learning%20Approach%20for%20Cryptanaly-sis%EE%80%81.%20The%20paper,key%20that%20was%20used%20to%20encrypt%20the%20plaintext. [65]TENG N,LU H,JING M,et al.PG-RNN:a password-guessing model based on recurrent neural networks[J].CAAI Transactions on Intelligent Systems,2018,13(6):889-896. [66]BOST R,POPA R A,TU S,et al.Machine learning classification over encrypted data[C]//Proceeding of the Network and Distributed System Security Symposium.2014:331-346. [67]HILL G D,BELLEKENS X J A.Deep learning based crypto-graphic primitive classification[J].arXiv:1709.08385,2017. [68]GUPTA M,DESHMUKH M.Single secret image sharingscheme using neural cryptography[J].Multimedia Tools and Applications,2020,79(12):183-204. [69]XIE P,BILENKO M,FINLEY T,et al.Crypto-Nets:neural networks over encrypted data[J].arXiv:1412.6181,2014. [70]LI X J,WU G W,YAO L,et al.Progress and future challenges of security attacks and defense mechanisms in machine learning[J].Journal of Software,2021,32(2):406-423. [71]SUN L,LI H,YU S W,et al.A survey on encrypted image re-cognition models[J].Journal of Cryptologic Research,2020,7(4):525-540. [72]JI S L,DU T Y,LI J F,et al.Security and privacy of machine learning models:a survey[J].Journal of Software,2021,32(1):41-67. [73]WEI L W,CHEN C,ZHANG L,et al.Security issues and privacy preserving in machine learning[J].Journal of Computer Research and Development,2020,57(10):2066-2085. [74]HE Y Z,HU X B,HE J W,et al.Privacy and security issues in machine learning systems:a survey[J].Journal of Computer Research and Development,2019,56(10):2049-2070. [75]ALSHAMMARI R,ZINCIR-HEYWOOD A N.Machine lear-ning based encrypted traffic classification:Identifying SSH and Skype[C]//IEEE Symposium on Computational Intelligence for Security and Defense Applications.2009:1-8. |
[1] | LENG Dian-dian, DU Peng, CHEN Jian-ting, XIANG Yang. Automated Container Terminal Oriented Travel Time Estimation of AGV [J]. Computer Science, 2022, 49(9): 208-214. |
[2] | HE Qiang, YIN Zhen-yu, HUANG Min, WANG Xing-wei, WANG Yuan-tian, CUI Shuo, ZHAO Yong. Survey of Influence Analysis of Evolutionary Network Based on Big Data [J]. Computer Science, 2022, 49(8): 1-11. |
[3] | LI Yao, LI Tao, LI Qi-fan, LIANG Jia-rui, Ibegbu Nnamdi JULIAN, CHEN Jun-jie, GUO Hao. Construction and Multi-feature Fusion Classification Research Based on Multi-scale Sparse Brain Functional Hyper-network [J]. Computer Science, 2022, 49(8): 257-266. |
[4] | ZHANG Guang-hua, GAO Tian-jiao, CHEN Zhen-guo, YU Nai-wen. Study on Malware Classification Based on N-Gram Static Analysis Technology [J]. Computer Science, 2022, 49(8): 336-343. |
[5] | CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323. |
[6] | LI Ya-ru, ZHANG Yu-lai, WANG Jia-chen. Survey on Bayesian Optimization Methods for Hyper-parameter Tuning [J]. Computer Science, 2022, 49(6A): 86-92. |
[7] | ZHAO Lu, YUAN Li-ming, HAO Kun. Review of Multi-instance Learning Algorithms [J]. Computer Science, 2022, 49(6A): 93-99. |
[8] | XIAO Zhi-hong, HAN Ye-tong, ZOU Yong-pan. Study on Activity Recognition Based on Multi-source Data and Logical Reasoning [J]. Computer Science, 2022, 49(6A): 397-406. |
[9] | YAO Ye, ZHU Yi-an, QIAN Liang, JIA Yao, ZHANG Li-xiang, LIU Rui-liang. Android Malware Detection Method Based on Heterogeneous Model Fusion [J]. Computer Science, 2022, 49(6A): 508-515. |
[10] | WANG Fei, HUANG Tao, YANG Ye. Study on Machine Learning Algorithms for Life Prediction of IGBT Devices Based on Stacking Multi-model Fusion [J]. Computer Science, 2022, 49(6A): 784-789. |
[11] | XU Jie, ZHU Yu-kun, XING Chun-xiao. Application of Machine Learning in Financial Asset Pricing:A Review [J]. Computer Science, 2022, 49(6): 276-286. |
[12] | LI Ye, CHEN Song-can. Physics-informed Neural Networks:Recent Advances and Prospects [J]. Computer Science, 2022, 49(4): 254-262. |
[13] | YAO Xiao-ming, DING Shi-chang, ZHAO Tao, HUANG Hong, LUO Jar-der, FU Xiao-ming. Big Data-driven Based Socioeconomic Status Analysis:A Survey [J]. Computer Science, 2022, 49(4): 80-87. |
[14] | ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61. |
[15] | ZHANG Xiao-qing, FANG Jian-sheng, XIAO Zun-jie, CHEN Bang, Risa HIGASHITA, CHEN Wan, YUAN Jin, LIU Jiang. Classification Algorithm of Nuclear Cataract Based on Anterior Segment Coherence Tomography Image [J]. Computer Science, 2022, 49(3): 204-210. |
|