About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in New Computing Environments. 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings

Research Article

Vulnerability Testing on the Key Scheduling Algorithm of PRESENT Using Deep Learning

Download(Requires a free EAI acccount)
7 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-96791-8_23,
        author={Ming Duan and Rui Zhou and Chaohui Fu and Sheng Guo and Qianqiong Wu},
        title={Vulnerability Testing on the Key Scheduling Algorithm of PRESENT Using Deep Learning},
        proceedings={Security and Privacy in New Computing Environments. 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings},
        proceedings_a={SPNCE},
        year={2022},
        month={3},
        keywords={Key scheduling algorithm Deep learning PRESENT},
        doi={10.1007/978-3-030-96791-8_23}
    }
    
  • Ming Duan
    Rui Zhou
    Chaohui Fu
    Sheng Guo
    Qianqiong Wu
    Year: 2022
    Vulnerability Testing on the Key Scheduling Algorithm of PRESENT Using Deep Learning
    SPNCE
    Springer
    DOI: 10.1007/978-3-030-96791-8_23
Ming Duan, Rui Zhou, Chaohui Fu, Sheng Guo, Qianqiong Wu

    Abstract

    PRESENT is a lightweight block cipher developed for extremely constrained environment such as RFID tags and IoT (Internet of Things). In 2020, Pareek et al. suggested a neural network to retrieving the 80-bit key of block cipher PRESENT from the last round subkeys and they arrived at a conclusion that the key scheduling algorithm is strong enough against its neural aided attack. While in this paper, we get a contradict result. We present two different experiments to test the vulnerability of key scheduling algorithm using deep learning. First, we build a 3-depth Fully Connected Neural Network to retrieve the master key bit by bit. The result is that we can predict about 80% bits of a random key with very high accuracy (above 0.9). Furthermore, we train a Residual Neural Network for classification. Compared with Fully Connected Network, we need less networks and the success rate is 100%. Finally, we combine the two networks to retrieve the whole 80-bit key from the last 64-bit round subkey. We think this method can be applied to the key schedule of other block ciphers or other similar cryptographic processes.

    Keywords
    Key scheduling algorithm Deep learning PRESENT
    Published
    2022-03-13
    Appears in
    SpringerLink
    http://dx.doi.org/10.1007/978-3-030-96791-8_23
    Copyright © 2021–2025 ICST
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL