Personality Patterns of Engineering, Law, Medical, and Teacher-Training Students: A Comparative Study
In: The Journal of social psychology, Band 74, Heft 2, S. 287-288
ISSN: 1940-1183
6 Ergebnisse
Sortierung:
In: The Journal of social psychology, Band 74, Heft 2, S. 287-288
ISSN: 1940-1183
In: The Journal of social psychology, Band 74, Heft 1, S. 135-135
ISSN: 1940-1183
In: The Journal of social psychology, Band 72, Heft 2, S. 297-298
ISSN: 1940-1183
In: Defence science journal: DSJ, Band 45, Heft 4, S. 303-306
ISSN: 0011-748X
In: Defence science journal: DSJ, Band 71, Heft 4, S. 499-506
ISSN: 0011-748X
Conventional cryptanalysis techniques necessitate an extensive analysis of non-linear functions defining the relationship of plain data, key, and corresponding cipher data. These functions have very high degree terms and make cryptanalysis work extremely difficult. The advent of deep learning algorithms along with the better and efficient computing resources has brought new opportunities to analyze cipher data in its raw form. The basic principle of designing a cipher is to introduce randomness into it, which means the absence of any patterns in cipher data. Due to this fact, the analysis of cipher data in its raw form becomes essential. Deep learning algorithms are different from conventional machine learning algorithms as the former directly work on raw data without any formal requirement of feature selection or feature extraction steps. With these facts and the assumption of the suitability of employing deep learning algorithms for cipher data, authors introduced a deep learning based method for finding biases in stream ciphers in the black-box analysis model. The proposed method has the objective to predict the occurrence of an output bit/byte at a specific location in the stream cipher generated keystream. The authors validate their method on stream cipher RC4 and its improved variant RC4A and discuss the results in detail. Further, the authors apply the method on two more stream ciphers namely Trivium and TRIAD. The proposed method can find bias in RC4 and shows the absence of this bias in its improved variant and other two ciphers. Focusing on RC4, the authors present a comparative analysis with some existing methods in terms of approach and observations and showed that their process is more straightforward and less complicated than the existing ones.
In: Defence science journal: DSJ, Band 71, Heft 5, S. 647-655
ISSN: 0011-748X
Modern day lightweight block ciphers provide powerful encryption methods for securing IoT communication data. Tiny digital devices exchange private data which the individual users might not be willing to get disclosed. On the other hand, the adversaries try their level best to capture this private data. The first step towards this is to identify the encryption scheme. This work is an effort to construct a distinguisher to identify the cipher used in encrypting the traffic data. We try to establish a deep learning based method to identify the encryption scheme used from a set of three lightweight block ciphers viz. LBlock, PRESENT and SPECK. We make use of images from MNIST and fashion MNIST data sets for establishing the cryptographic distinguisher. Our results show that the overall classification accuracy depends firstly on the type of key used in encryption and secondly on how frequently the pixel values change in original input image.