21 - 25 April 2024
National Harbor, Maryland, US
Conference 13058 > Paper 13058-22
Paper 13058-22

Neural cryptography: vulnerabilities and attack strategies

On demand | Presented live 23 April 2024

Abstract

A number of research papers has been published using the architecture of adversarial neural networks to prove that communication between two neural net based on synchronized input can be achieved, and without knowledge of this synchronized information these systems can not be breached. In this paper we will try to evaluate these adversarial neural net architectures when a third party gain access to partial secret key, or a noisy secret key, or has knowledge about loss function, or loss values itself, or activation functions used during training of encryption layers. We explore the cryptanalysis side of it in which we will focus on vulnerabilities a neural-net based cryptography network can face. This can be used in future to improve the current neural net based cryptography architectures. In this paper we show that while the encryption key is necessary to decrypt the messages in neural network domain, the adversarial neural networks can occasionally decrypt messages or raise a concern which will require further training.

Presenter

Lubjana Beshaj
U.S. Military Academy (United States)
Lubjana Beshaj is a research scientist at Army Cyber Institute and an Associate Professor at West Point. Her research interests are cryptography and emerging technologies. More specifically, algebraic curve cryptography, post quantum cryptography, homomorphic encryption, quantum stabilizer codes, blockchain technologies, and neural network cryptography.
Application tracks: AI/ML
Presenter/Author
Lubjana Beshaj
U.S. Military Academy (United States)
Author
Kevadiya Inc. (United States)