Skip to main content

2024 | OriginalPaper | Buchkapitel

LSTM-Based Cryptanalysis of Stream Cipher Espresso

verfasst von : Akhilesh, Himanshu Singh, Girish Mishra

Erschienen in: Cryptology and Network Security with Machine Learning

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The prediction of encryption keys in cryptographic systems poses a significant security threat. In this study, we investigate the feasibility of predicting the keystream used in the Espresso stream cipher through the implementation of LSTM and CNN architectures. The Espresso stream cipher, known for its lightweight design and cryptographic strength, serves as the basis for our analysis. By leveraging the capabilities of LSTM and CNN, we aim to assess the vulnerability of the Espresso stream cipher to keystream prediction attacks. By training and evaluating LSTM and CNN models on a dataset consisting of keystream bytes, we examine the extent to which the keystream used in the Espresso stream cipher can be predicted. Our experimental results demonstrate the effectiveness of LSTM and CNN in predicting the keystream bits or bytes of the Espresso stream cipher. By shedding light on the weaknesses of the Espresso stream cipher in the context of keystream prediction, this research work contributes to the field of cryptographic security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Olsson M (2013) “5GrEEn: towards green 5G mobile networks. In: IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob). IEEE, pp 212–216 Olsson M (2013) “5GrEEn: towards green 5G mobile networks. In: IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob). IEEE, pp 212–216
3.
Zurück zum Zitat Golomb SW (1982) Shift register sequences. Aegean Park Press Golomb SW (1982) Shift register sequences. Aegean Park Press
4.
Zurück zum Zitat Golic JD (1996) On the security of nonlinear filter generators. In: Proceedings of Fast software encryption, third international workshop, Cambridge, UK, February 21–23, 1996, vol 1039. Lecture notes in computer science. Springer, pp 173–188. https://doi.org/10.1007/3-540-60865-652 Golic JD (1996) On the security of nonlinear filter generators. In: Proceedings of Fast software encryption, third international workshop, Cambridge, UK, February 21–23, 1996, vol 1039. Lecture notes in computer science. Springer, pp 173–188. https://​doi.​org/​10.​1007/​3-540-60865-652
5.
Zurück zum Zitat Braeken A, Lano J (2006) On the (im) possibility of practical and secure nonlinear filters and combiners. In: Selected areas in cryptography: 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11–12, 2005, revised selected papers 12. Springer, pp 159–174 Braeken A, Lano J (2006) On the (im) possibility of practical and secure nonlinear filters and combiners. In: Selected areas in cryptography: 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11–12, 2005, revised selected papers 12. Springer, pp 159–174
6.
Zurück zum Zitat Cusick TW, Stanica P (2017) Cryptographic Boolean functions and applications. Academic Press Cusick TW, Stanica P (2017) Cryptographic Boolean functions and applications. Academic Press
7.
Zurück zum Zitat Dubrova E (2012) A scalable method for constructing Galois NLFSRs with period 2n–1 using cross-join pairs. IEEE Trans Inf Theory 59(1):703–709MathSciNetCrossRef Dubrova E (2012) A scalable method for constructing Galois NLFSRs with period 2n–1 using cross-join pairs. IEEE Trans Inf Theory 59(1):703–709MathSciNetCrossRef
8.
9.
Zurück zum Zitat Dubrova E, Hell M (2017) Espresso: a stream cipher for 5G wireless communication systems. Crypt Commun 9:273–289MathSciNetCrossRef Dubrova E, Hell M (2017) Espresso: a stream cipher for 5G wireless communication systems. Crypt Commun 9:273–289MathSciNetCrossRef
11.
Zurück zum Zitat Deb S, Bhuyan B (2020) Performance analysis of current lightweight stream ciphers for constrained environments. Sādhanā 45:1–12CrossRef Deb S, Bhuyan B (2020) Performance analysis of current lightweight stream ciphers for constrained environments. Sādhanā 45:1–12CrossRef
12.
Zurück zum Zitat Lowenrud R, Kimblad J (2016) Implementation and evaluation of espresso stream cipher in 65nm CMOS Lowenrud R, Kimblad J (2016) Implementation and evaluation of espresso stream cipher in 65nm CMOS
14.
Zurück zum Zitat Sherstinsky A (2020) Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network. Physica D Nonlinear Phenomena 404:132306MathSciNetCrossRef Sherstinsky A (2020) Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network. Physica D Nonlinear Phenomena 404:132306MathSciNetCrossRef
15.
Zurück zum Zitat Staudemeyer RC, Morris ER (2019) Understanding LSTM-a tutorial into long short-term memory recurrent neural networks. In: arXiv preprint arXiv:1909.09586 Staudemeyer RC, Morris ER (2019) Understanding LSTM-a tutorial into long short-term memory recurrent neural networks. In: arXiv preprint arXiv:​1909.​09586
16.
Zurück zum Zitat Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735–C1780 Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735–C1780
18.
Zurück zum Zitat Robshaw MJB (1994) Stream ciphers technical report TR-701. RSA Laboratories Robshaw MJB (1994) Stream ciphers technical report TR-701. RSA Laboratories
19.
Zurück zum Zitat Robshaw M, Billet O (2008) Trivium. In: New stream cipher designs: the eSTREAM finalists, pp 244–C266 Robshaw M, Billet O (2008) Trivium. In: New stream cipher designs: the eSTREAM finalists, pp 244–C266
20.
Zurück zum Zitat Martin H et al (2008) The grain family of stream ciphers. In: New stream cipher designs: the eSTREAM finalists (2008), pp 179–C190 Martin H et al (2008) The grain family of stream ciphers. In: New stream cipher designs: the eSTREAM finalists (2008), pp 179–C190
21.
Zurück zum Zitat Wang MX, Dai Lin D (2017) Related key chosen IV attack on stream cipher espresso variant. In: 2017 IEEE international conference on computational science and engineering (CSE) and IEEE international conference on embedded and ubiquitous computing (EUC), vol. 1. IEEE, pp 580–C587 Wang MX, Dai Lin D (2017) Related key chosen IV attack on stream cipher espresso variant. In: 2017 IEEE international conference on computational science and engineering (CSE) and IEEE international conference on embedded and ubiquitous computing (EUC), vol. 1. IEEE, pp 580–C587
22.
Zurück zum Zitat Deb S, Bhuyan B (2018) Performance evaluation of grain family and Espresso ciphers for applications on resource constrained devices. ICT Express 4(1):19-C23CrossRef Deb S, Bhuyan B (2018) Performance evaluation of grain family and Espresso ciphers for applications on resource constrained devices. ICT Express 4(1):19-C23CrossRef
23.
Zurück zum Zitat Bepery C et al, Stream cipher based modified espresso algorithm for 5G communication Bepery C et al, Stream cipher based modified espresso algorithm for 5G communication
24.
Zurück zum Zitat Sinha N (2021) Internal state recovery of Espresso stream cipher using conditional sampling resistance and TMDTO attack. Adv Math Commun 15(3):539-C556MathSciNetCrossRef Sinha N (2021) Internal state recovery of Espresso stream cipher using conditional sampling resistance and TMDTO attack. Adv Math Commun 15(3):539-C556MathSciNetCrossRef
25.
Zurück zum Zitat Shi Z et al (2022) Design space exploration of galois and fibonacci configuration based on espresso stream cipher. ACM Trans Reconfigurable Technol Syst (TRETS) (2022) Shi Z et al (2022) Design space exploration of galois and fibonacci configuration based on espresso stream cipher. ACM Trans Reconfigurable Technol Syst (TRETS) (2022)
Metadaten
Titel
LSTM-Based Cryptanalysis of Stream Cipher Espresso
verfasst von
Akhilesh
Himanshu Singh
Girish Mishra
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0641-9_51

Neuer Inhalt