IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Machine Learning Techniques to Predict the Inputs in Symmetric Encryption Algorithm

Machine Learning Techniques to Predict the Inputs in Symmetric Encryption Algorithm
View Sample PDF
Author(s): M. Sivasakthi (SRM Institute of Science and Technology, India)and A. Meenakshi (SRM Institute of Science and Technology, India)
Copyright: 2024
Pages: 10
Source title: Innovative Machine Learning Applications for Cryptography
Source Author(s)/Editor(s): J. Anitha Ruth (SRM Institute of Science and Technology, Vadapalani, India), G.V. Mahesh Vijayalakshmi (BMS Institute of Technology and Management, India), P. Visalakshi (Department of Networking and Communications, College of Engineering and Technology, SRM Institute of Science and Technology, Katankulathur, India), R. Uma (Sri Sairam Engineering College, Chennai, India)and A. Meenakshi (SRM Institute of Science and Technology, Vadapalani, India)
DOI: 10.4018/979-8-3693-1642-9.ch009

Purchase

View Machine Learning Techniques to Predict the Inputs in Symmetric Encryption Algorithm on the publisher's website for pricing and purchasing information.

Abstract

Applying machine learning algorithms for encryption problems is reasonable in today's research connecting with cryptography. Using an encryption standard such as DES can give insight into how machine learning can help in breaking the encryption standards. The inspiration for this chapter is to use machine learning to reverse engineer hash functions. Hash functions are supposed to be tough to reverse one-way functions. The hash function will be learned by machine learning algorithm with a probability of more than 50%, which means the can develop their guesstimate of the reverse. This is concluded by executing the DES symmetric encryption function to generate N numerous values of DES with a set key and the machine learning algorithm is trained on a neural network to identify the first bit of the input based on the value of the function's output. Testing has ended through a new table, which was created similarly but with different inputs. The SVM runs on the new table, and it compares to the other table, and a confusion matrix is used to measure the excellence of the guesstimates.

Related Content

Preeti Mariam Mathews, Anjali Sandeep Gaikwad, Mathu Uthaman, B. Sreelekshmi, V. Dankan Gowda. © 2024. 26 pages.
Dankan Gowda V., Joohi Garg, Shaifali Garg, K. D. V. Prasad, Sampathirao Suneetha. © 2024. 20 pages.
K. Sriprasadh. © 2024. 24 pages.
R. Valarmathi, R. Uma, P. Ramkumar, Srivatsan Venkatesh. © 2024. 20 pages.
R. Jayashree, J. Venkata Subramanian. © 2024. 14 pages.
M. Indira, K. S. Mohanasundaram, M. Saranya. © 2024. 14 pages.
R. Thenmozhi, D. Vetriselvi, A. Arokiaraj Jovith. © 2024. 26 pages.
Body Bottom