散列函数
计算机科学
深度学习
方案(数学)
排列(音乐)
NIST公司
密码学
人工智能
密码分析
模式(计算机接口)
人工神经网络
构造(python库)
理论计算机科学
算法
计算机安全
语音识别
数学
计算机网络
人机交互
物理
数学分析
声学
作者
Guozhen Liu,Jingwen Lu,Huina Li,Peng Tang,Weidong Qiu
出处
期刊:Advances in intelligent systems and computing
日期:2021-01-01
卷期号:: 637-648
被引量:8
标识
DOI:10.1007/978-3-030-73103-8_45
摘要
With the rapid progress in the artificial intelligence field, machine learning algorithms have been utilized to construct cryptographic schemes and conduct cryptanalysis. In this paper, we propose deep learning-based preimage attacks against variants of Xoodyak hash mode which is a lightweight scheme submitted to the NIST lightweight cryptography standardization project. Three attack models whose internal permutations are of reduced rounds are derived from the original Xoodyak hash mode. Deep neural networks (DNNs) for attack models of 1-round underlying permutations are trained so that the messages of given hash values can be predicted correctly with the networks. In valid attacks, the DNNs are of a low loss rate and high accuracy. This work is more of a tentative attempt to examine the effectiveness of deep learning algorithms employed in conventional preimage attacks. In conclusion, it shows that deep learning techniques make little difference in preimage attacks against Xoodyak hash mode. Compared to the full 12-round internal permutation, only 1 round is covered in the deep learning-based attacks.
科研通智能强力驱动
Strongly Powered by AbleSci AI