Skip to main content
Top

2024 | OriginalPaper | Chapter

LSTM-Based Cryptanalysis of Stream Cipher Espresso

Authors : Akhilesh, Himanshu Singh, Girish Mishra

Published in: Cryptology and Network Security with Machine Learning

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The prediction of encryption keys in cryptographic systems poses a significant security threat. In this study, we investigate the feasibility of predicting the keystream used in the Espresso stream cipher through the implementation of LSTM and CNN architectures. The Espresso stream cipher, known for its lightweight design and cryptographic strength, serves as the basis for our analysis. By leveraging the capabilities of LSTM and CNN, we aim to assess the vulnerability of the Espresso stream cipher to keystream prediction attacks. By training and evaluating LSTM and CNN models on a dataset consisting of keystream bytes, we examine the extent to which the keystream used in the Espresso stream cipher can be predicted. Our experimental results demonstrate the effectiveness of LSTM and CNN in predicting the keystream bits or bytes of the Espresso stream cipher. By shedding light on the weaknesses of the Espresso stream cipher in the context of keystream prediction, this research work contributes to the field of cryptographic security.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Olsson M (2013) “5GrEEn: towards green 5G mobile networks. In: IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob). IEEE, pp 212–216 Olsson M (2013) “5GrEEn: towards green 5G mobile networks. In: IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob). IEEE, pp 212–216
3.
go back to reference Golomb SW (1982) Shift register sequences. Aegean Park Press Golomb SW (1982) Shift register sequences. Aegean Park Press
4.
go back to reference Golic JD (1996) On the security of nonlinear filter generators. In: Proceedings of Fast software encryption, third international workshop, Cambridge, UK, February 21–23, 1996, vol 1039. Lecture notes in computer science. Springer, pp 173–188. https://doi.org/10.1007/3-540-60865-652 Golic JD (1996) On the security of nonlinear filter generators. In: Proceedings of Fast software encryption, third international workshop, Cambridge, UK, February 21–23, 1996, vol 1039. Lecture notes in computer science. Springer, pp 173–188. https://​doi.​org/​10.​1007/​3-540-60865-652
5.
go back to reference Braeken A, Lano J (2006) On the (im) possibility of practical and secure nonlinear filters and combiners. In: Selected areas in cryptography: 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11–12, 2005, revised selected papers 12. Springer, pp 159–174 Braeken A, Lano J (2006) On the (im) possibility of practical and secure nonlinear filters and combiners. In: Selected areas in cryptography: 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11–12, 2005, revised selected papers 12. Springer, pp 159–174
6.
go back to reference Cusick TW, Stanica P (2017) Cryptographic Boolean functions and applications. Academic Press Cusick TW, Stanica P (2017) Cryptographic Boolean functions and applications. Academic Press
7.
go back to reference Dubrova E (2012) A scalable method for constructing Galois NLFSRs with period 2n–1 using cross-join pairs. IEEE Trans Inf Theory 59(1):703–709MathSciNetCrossRef Dubrova E (2012) A scalable method for constructing Galois NLFSRs with period 2n–1 using cross-join pairs. IEEE Trans Inf Theory 59(1):703–709MathSciNetCrossRef
9.
11.
go back to reference Deb S, Bhuyan B (2020) Performance analysis of current lightweight stream ciphers for constrained environments. Sādhanā 45:1–12CrossRef Deb S, Bhuyan B (2020) Performance analysis of current lightweight stream ciphers for constrained environments. Sādhanā 45:1–12CrossRef
12.
go back to reference Lowenrud R, Kimblad J (2016) Implementation and evaluation of espresso stream cipher in 65nm CMOS Lowenrud R, Kimblad J (2016) Implementation and evaluation of espresso stream cipher in 65nm CMOS
14.
go back to reference Sherstinsky A (2020) Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network. Physica D Nonlinear Phenomena 404:132306MathSciNetCrossRef Sherstinsky A (2020) Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network. Physica D Nonlinear Phenomena 404:132306MathSciNetCrossRef
15.
go back to reference Staudemeyer RC, Morris ER (2019) Understanding LSTM-a tutorial into long short-term memory recurrent neural networks. In: arXiv preprint arXiv:1909.09586 Staudemeyer RC, Morris ER (2019) Understanding LSTM-a tutorial into long short-term memory recurrent neural networks. In: arXiv preprint arXiv:​1909.​09586
16.
go back to reference Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735–C1780 Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735–C1780
18.
go back to reference Robshaw MJB (1994) Stream ciphers technical report TR-701. RSA Laboratories Robshaw MJB (1994) Stream ciphers technical report TR-701. RSA Laboratories
19.
go back to reference Robshaw M, Billet O (2008) Trivium. In: New stream cipher designs: the eSTREAM finalists, pp 244–C266 Robshaw M, Billet O (2008) Trivium. In: New stream cipher designs: the eSTREAM finalists, pp 244–C266
20.
go back to reference Martin H et al (2008) The grain family of stream ciphers. In: New stream cipher designs: the eSTREAM finalists (2008), pp 179–C190 Martin H et al (2008) The grain family of stream ciphers. In: New stream cipher designs: the eSTREAM finalists (2008), pp 179–C190
21.
go back to reference Wang MX, Dai Lin D (2017) Related key chosen IV attack on stream cipher espresso variant. In: 2017 IEEE international conference on computational science and engineering (CSE) and IEEE international conference on embedded and ubiquitous computing (EUC), vol. 1. IEEE, pp 580–C587 Wang MX, Dai Lin D (2017) Related key chosen IV attack on stream cipher espresso variant. In: 2017 IEEE international conference on computational science and engineering (CSE) and IEEE international conference on embedded and ubiquitous computing (EUC), vol. 1. IEEE, pp 580–C587
22.
go back to reference Deb S, Bhuyan B (2018) Performance evaluation of grain family and Espresso ciphers for applications on resource constrained devices. ICT Express 4(1):19-C23CrossRef Deb S, Bhuyan B (2018) Performance evaluation of grain family and Espresso ciphers for applications on resource constrained devices. ICT Express 4(1):19-C23CrossRef
23.
go back to reference Bepery C et al, Stream cipher based modified espresso algorithm for 5G communication Bepery C et al, Stream cipher based modified espresso algorithm for 5G communication
24.
go back to reference Sinha N (2021) Internal state recovery of Espresso stream cipher using conditional sampling resistance and TMDTO attack. Adv Math Commun 15(3):539-C556MathSciNetCrossRef Sinha N (2021) Internal state recovery of Espresso stream cipher using conditional sampling resistance and TMDTO attack. Adv Math Commun 15(3):539-C556MathSciNetCrossRef
25.
go back to reference Shi Z et al (2022) Design space exploration of galois and fibonacci configuration based on espresso stream cipher. ACM Trans Reconfigurable Technol Syst (TRETS) (2022) Shi Z et al (2022) Design space exploration of galois and fibonacci configuration based on espresso stream cipher. ACM Trans Reconfigurable Technol Syst (TRETS) (2022)
Metadata
Title
LSTM-Based Cryptanalysis of Stream Cipher Espresso
Authors
Akhilesh
Himanshu Singh
Girish Mishra
Copyright Year
2024
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0641-9_51