On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks

  • Authors:
  • Jung-Wei Chou;Shou-De Lin;Chen-Mou Cheng

  • Affiliations:
  • National Taiwan University, Taipei, Taiwan Roc;National Taiwan University, Taipei, Taiwan Roc;National Taiwan University, Taipei, Taiwan Roc

  • Venue:
  • Proceedings of the 5th ACM workshop on Security and artificial intelligence
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Cryptographic distinguishing attacks, in which the attacker is able to extract enough "information" from an encrypted message to distinguish it from a piece of random data, allow for powerful cryptanalysis both in theory and in practice. In this paper, we report our experience of applying state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks on several public datasets. We try several kinds of existing and new features on these datasets and find that the ciphers' "modes of operation" dominate the performance of classification tasks. When CBC mode is used with a random initial vector for each plaintext, the performance is extremely bad, while the performance for certain datasets is relatively good when ECB mode is used. We conclude that, in contrary to the findings of several existing works, the state-of-the-art machine learning techniques cannot extract useful information from ciphertexts produced by modern ciphers operating in a reasonably secure mode such as CBC, let alone distinguish them from random data.