Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.12188/25671
DC FieldValueLanguage
dc.contributor.authorJankovikj, Dushicaen_US
dc.contributor.authorMihajloska Trpceska, Hristinaen_US
dc.contributor.authorDimitrova, Vesnaen_US
dc.date.accessioned2023-02-13T09:44:22Z-
dc.date.available2023-02-13T09:44:22Z-
dc.date.issued2022-
dc.identifier.urihttp://hdl.handle.net/20.500.12188/25671-
dc.description.abstractOur research focuses on attacking Ascon, a lightweight block cipher presented as a candidate in the NIST Lightweight Cryptography Standardization Process. This block cipher provides authenticated encryption with associated data functionalities. We propose a cryptanalysis model based on deep learning (DL), where the goal is to predict plaintext bits given knowledge of the ciphertext and other publicly known cipher input parameters. Our experiments show that such knownplaintext attacks can be successfully executed on a round reduced version of the cipher stripped of the finalization phase. This, in turn, validates the theoretical results. Cryptographic algorithms are complex for the purpose of security and cannot be easily broken by an ML model in their regular form (not reduced). We explore multiple dataset generation techniques, model design, and training hyperparameters.en_US
dc.subjectOur research focuses on attacking Ascon, a lightweight block cipher presented as a candidate in the NIST Lightweight Cryptography Standardization Process. This block cipher provides authenticated encryption with associated data functionalities. We propose a cryptanalysis model based on deep learning (DL), where the goal is to predict plaintext bits given knowledge of the ciphertext and other publicly known cipher input parameters. Our experiments show that such knownplaintext attacks can be successfully executed on a round reduced version of the cipher stripped of the finalization phase. This, in turn, validates the theoretical results. Cryptographic algorithms are complex for the purpose of security and cannot be easily broken by an ML model in their regular form (not reduced). We explore multiple dataset generation techniques, model design, and training hyperparameters.en_US
dc.titleCryptanalysis of Round-Reduced ASCON powered by MLen_US
dc.typeProceedingsen_US
dc.relation.conferenceThe 19th International Conference on Informatics and Information Technologies – CIIT 2022en_US
item.grantfulltextopen-
item.fulltextWith Fulltext-
crisitem.author.deptFaculty of Computer Science and Engineering-
Appears in Collections:Faculty of Computer Science and Engineering: Conference papers
Files in This Item:
File Description SizeFormat 
CIIT_2022_2.pdf435.96 kBAdobe PDFView/Open
Show simple item record

Page view(s)

78
checked on May 15, 2024

Download(s)

44
checked on May 15, 2024

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.