encryption method
LenslessMic: Audio Encryption and Authentication via Lensless Computational Imaging
Grinberg, Petr, Bezzam, Eric, Prandoni, Paolo, Vetterli, Martin
ABSTRACT With society's increasing reliance on digital data sharing, the protection of sensitive information has become critical. Encryption serves as one of the privacy-preserving methods; however, its realization in the audio domain predominantly relies on signal processing or software methods embedded into hardware. In this paper, we introduce LenslessMic, a hybrid optical hardware-based encryption method that utilizes a lensless camera as a physical layer of security applicable to multiple types of audio. We show that Lensless-Mic enables (1) robust authentication of audio recordings and (2) encryption strength that can rival the search space of 256-bit digital standards, while maintaining high-quality signals and minimal loss of content information. The approach is validated with a low-cost Raspberry Pi prototype and is open-sourced together with datasets to facilitate research in the area. Index T erms-- Lensless imaging, audio, privacy, encryption, authentication 1. INTRODUCTION With the rapid growth of digital connectivity, security risks such as data leaks, content manipulation, and deepfakes have become increasingly prevalent.
- North America > United States (0.29)
- Europe > Switzerland (0.04)
- Asia > Japan > Honshū > Kantō > Tokyo Metropolis Prefecture > Tokyo (0.04)
Benchmarking Large Language Models for Cryptanalysis and Side-Channel Vulnerabilities
Maskey, Utsav, Zhu, Chencheng, Naseem, Usman
Recent advancements in large language models (LLMs) have transformed natural language understanding and generation, leading to extensive benchmarking across diverse tasks. However, cryptanalysis - a critical area for data security and its connection to LLMs' generalization abilities - remains underexplored in LLM evaluations. To address this gap, we evaluate the cryptanalytic potential of state-of-the-art LLMs on ciphertexts produced by a range of cryptographic algorithms. We introduce a benchmark dataset of diverse plaintexts, spanning multiple domains, lengths, writing styles, and topics, paired with their encrypted versions. Using zero-shot and few-shot settings along with chain-of-thought prompting, we assess LLMs' decryption success rate and discuss their comprehension abilities. Our findings reveal key insights into LLMs' strengths and limitations in side-channel scenarios and raise concerns about their susceptibility to under-generalization-related attacks. This research highlights the dual-use nature of LLMs in security contexts and contributes to the ongoing discussion on AI safety and security.
ViT Enhanced Privacy-Preserving Secure Medical Data Sharing and Classification
Amin, Al, Hasan, Kamrul, Ullah, Sharif, Hossain, M. Shamim
Privacy-preserving and secure data sharing are critical for medical image analysis while maintaining accuracy and minimizing computational overhead are also crucial. Applying existing deep neural networks (DNNs) to encrypted medical data is not always easy and often compromises performance and security. To address these limitations, this research introduces a secure framework consisting of a learnable encryption method based on the block-pixel operation to encrypt the data and subsequently integrate it with the Vision Transformer (ViT). The proposed framework ensures data privacy and security by creating unique scrambling patterns per key, providing robust performance against leading bit attacks and minimum difference attacks.
- North America > United States > Arkansas > Faulkner County > Conway (0.15)
- North America > United States > Tennessee (0.05)
- Asia > Middle East > Saudi Arabia > Riyadh Province > Riyadh (0.05)
- Information Technology > Security & Privacy (1.00)
- Health & Medicine > Diagnostic Medicine > Imaging (0.41)
Artificial Intelligence enhanced Security Problems in Real-Time Scenario using Blowfish Algorithm
Chinnam, Yuvaraju, Sambana, Bosubabu
In a nutshell, "the cloud" refers to a collection of interconnected computing resources made possible by an extensive, real-time communication network like the internet. Because of its potential to reduce processing costs, the emerging paradigm of cloud computing has recently attracted a large number of academics. The exponential expansion of cloud computing has made the rapid expansion of cloud services very remarkable. Ensuring the security of personal information in today's interconnected world is no easy task. These days, security is really crucial. Models of security that are relevant to cloud computing include confidentiality, authenticity, accessibility, data integrity, and recovery. Using the Hybrid Encryption this study, we cover all the security issues and leaks in cloud infrastructure.
- Asia > Singapore (0.04)
- Asia > India > Andhra Pradesh (0.04)
- Information Technology > Services (1.00)
- Information Technology > Security & Privacy (1.00)
Efficient Fine-Tuning with Domain Adaptation for Privacy-Preserving Vision Transformer
Nagamori, Teru, Shiota, Sayaka, Kiya, Hitoshi
We propose a novel method for privacy-preserving deep neural networks (DNNs) with the Vision Transformer (ViT). The method allows us not only to train models and test with visually protected images but to also avoid the performance degradation caused from the use of encrypted images, whereas conventional methods cannot avoid the influence of image encryption. A domain adaptation method is used to efficiently fine-tune ViT with encrypted images. In experiments, the method is demonstrated to outperform conventional methods in an image classification task on the CIFAR-10 and ImageNet datasets in terms of classification accuracy.
- Asia > Japan > Honshū > Kantō > Tokyo Metropolis Prefecture > Tokyo (0.16)
- North America > Canada > Ontario > Toronto (0.14)
- Europe > Serbia > Central Serbia > Belgrade (0.04)
- (2 more...)
- Information Technology > Sensing and Signal Processing > Image Processing (1.00)
- Information Technology > Artificial Intelligence > Vision (1.00)
- Information Technology > Data Science > Data Mining > Big Data (0.64)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (0.50)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Hardware (1.00)
- Information Technology > Artificial Intelligence (0.80)
SmartKex: Machine Learning Assisted SSH Keys Extraction From The Heap Dump
Fellicious, Christofer, Sentanoe, Stewart, Granitzer, Michael, Reiser, Hans P.
Digital forensics is the process of extracting, preserving, and documenting evidence in digital devices. A commonly used method in digital forensics is to extract data from the main memory of a digital device. However, the main challenge is identifying the important data to be extracted. Several pieces of crucial information reside in the main memory, like usernames, passwords, and cryptographic keys such as SSH session keys. In this paper, we propose SmartKex, a machine-learning assisted method to extract session keys from heap memory snapshots of an OpenSSH process. In addition, we release an openly available dataset and the corresponding toolchain for creating additional data. Finally, we compare SmartKex with naive brute-force methods and empirically show that SmartKex can extract the session keys with high accuracy and high throughput. With the provided resources, we intend to strengthen the research on the intersection between digital forensics, cybersecurity, and machine learning.
Encrypted Internet traffic classification using a supervised Spiking Neural Network
Rasteh, Ali, Delpech, Florian, Aguilar-Melchor, Carlos, Zimmer, Romain, Shouraki, Saeed Bagheri, Masquelier, Timothée
Internet traffic recognition is an essential tool for access providers since recognizing traffic categories related to different data packets transmitted on a network help them define adapted priorities. That means, for instance, high priority requirements for an audio conference and low ones for a file transfer, to enhance user experience. As internet traffic becomes increasingly encrypted, the mainstream classic traffic recognition technique, payload inspection, is rendered ineffective. This paper uses machine learning techniques for encrypted traffic classification, looking only at packet size and time of arrival. Spiking neural networks (SNN), largely inspired by how biological neurons operate, were used for two reasons. Firstly, they are able to recognize time-related data packet features. Secondly, they can be implemented efficiently on neuromorphic hardware with a low energy footprint. Here we used a very simple feedforward SNN, with only one fully-connected hidden layer, and trained in a supervised manner using the newly introduced method known as Surrogate Gradient Learning. Surprisingly, such a simple SNN reached an accuracy of 95.9% on ISCX datasets, outperforming previous approaches. Besides better accuracy, there is also a very significant improvement on simplicity: input size, number of neurons, trainable parameters are all reduced by one to four orders of magnitude. Next, we analyzed the reasons for this good accuracy. It turns out that, beyond spatial (i.e. packet size) features, the SNN also exploits temporal ones, mostly the nearly synchronous (within a 200ms range) arrival times of packets with certain sizes. Taken together, these results show that SNNs are an excellent fit for encrypted internet traffic classification: they can be more accurate than conventional artificial neural networks (ANN), and they could be implemented efficiently on low power embedded systems.
- Europe > France > Occitanie > Haute-Garonne > Toulouse (0.04)
- North America > United States > District of Columbia > Washington (0.04)
- North America > Canada > New Brunswick > Fredericton (0.04)
- Asia > Middle East > Iran > Tehran Province > Tehran (0.04)
- Information Technology (0.93)
- Telecommunications > Networks (0.89)
What is Enigma Machine? How Does Enigma Work? - The Science Tech
Enigma, first produced by a German engineer named Arthur Scherbius, is an electro-mechanical encoded communication machine. Its use was evaluated for commercial purposes as it was started after WW1. However, in the aftermath of World War II, Germany was used in military and government services and had great benefits. Enigma models, which are used by Nazi Germany, are much more advanced. Because of its complex encryption systems, it was preferred to send military information.
- Information Technology > Security & Privacy (0.92)
- Government > Military (0.60)
- Information Technology > Security & Privacy (0.92)
- Information Technology > Artificial Intelligence > History (0.57)
Secure Data Sharing With Flow Model
Wu, Chenwei, Du, Chenzhuang, Yuan, Yang
We consider a variant of this problem, where instead of requiring the data to be completely private so that no one gets In the classical multi-party computation setting, any information about it, we only require data to be partially multiple parties jointly compute a function without private. That is, no one can efficiently recover the original revealing their own input data. We consider a data, but users can extract other useful information from the variant of this problem, where the input data can encrypted data. Although being different, our requirement be shared for machine learning training purposes, has the flavor of differential privacy (Dwork et al., 2006), but the data are also encrypted so that they cannot e.g., users can obtain the average salary of all employees, be recovered by other parties. We present a but cannot figure out the salary of each individual.
- North America > United States > North Carolina > Durham County > Durham (0.04)
- Europe > United Kingdom > England > Cambridgeshire > Cambridge (0.04)
- Asia > China > Beijing > Beijing (0.04)