Cryptanalysis of the SIMON Cypher Using Neo4j
- URL: http://arxiv.org/abs/2405.04735v1
- Date: Wed, 8 May 2024 00:52:57 GMT
- Title: Cryptanalysis of the SIMON Cypher Using Neo4j
- Authors: Jonathan Cook, Sabih ur Rehman, M. Arif Khan,
- Abstract summary: This paper introduces the novel use of knowledge graphs to identify intricate relationships between differentials in the SIMON LEA.
It allows the identification of optimal paths throughout the differentials, and increasing the effectiveness of the differential security analyses of SIMON.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: The exponential growth in the number of Internet of Things (IoT) devices has seen the introduction of several Lightweight Encryption Algorithms (LEA). While LEAs are designed to enhance the integrity, privacy and security of data collected and transmitted by IoT devices, it is hazardous to assume that all LEAs are secure and exhibit similar levels of protection. To improve encryption strength, cryptanalysts and algorithm designers routinely probe LEAs using various cryptanalysis techniques to identify vulnerabilities and limitations of LEAs. Despite recent improvements in the efficiency of cryptanalysis utilising heuristic methods and a Partial Difference Distribution Table (PDDT), the process remains inefficient, with the random nature of the heuristic inhibiting reproducible results. However, the use of a PDDT presents opportunities to identify relationships between differentials utilising knowledge graphs, leading to the identification of efficient paths throughout the PDDT. This paper introduces the novel use of knowledge graphs to identify intricate relationships between differentials in the SIMON LEA, allowing for the identification of optimal paths throughout the differentials, and increasing the effectiveness of the differential security analyses of SIMON.
Related papers
- Deep Learning and Chaos: A combined Approach To Image Encryption and Decryption [1.8749305679160366]
We introduce a novel image encryption and decryption algorithm using hyperchaotic signals from the novel 3D hyperchaotic map, 2D memristor map, Convolutional Neural Network (CNN)
The robustness of the encryption algorithm is shown by key sensitivity analysis, i.e., the average sensitivity of the algorithm to key elements.
arXiv Detail & Related papers (2024-06-24T16:56:22Z) - Evaluating the Security of Merkle Trees in the Internet of Things: An Analysis of Data Falsification Probabilities [27.541105686358378]
This paper develops a theoretical framework to calculate the probability of data falsification, taking into account various scenarios based on the length of the Merkle path and hash length.
Empirical experiments validate the theoretical models, exploring simulations with diverse hash lengths and Merkle path lengths.
The findings reveal a decrease in falsification probability with increasing hash length and an inverse relationship with longer Merkle paths.
arXiv Detail & Related papers (2024-04-18T11:24:12Z) - Lightweight Cryptanalysis of IoT Encryption Algorithms : Is Quota Sampling the Answer? [0.0]
Two well-known lightweight algorithms are SIMON and SIMECK which have been specifically designed for use on resource-constrained IoT devices.
It is necessary to test these algorithms for resilience against differential cryptanalysis attacks.
In this paper, we introduce Versatile Investigative Sampling Technique for Advanced Cryptanalysis.
arXiv Detail & Related papers (2024-04-12T00:08:39Z) - CRYPTO-MINE: Cryptanalysis via Mutual Information Neural Estimation [42.481750913003204]
Mutual Information (MI) is a measure to evaluate the efficiency of cryptosystems.
Recent advances in machine learning have enabled progress in estimating MI using neural networks.
This work presents a novel application of MI estimation in the field of cryptography.
arXiv Detail & Related papers (2023-09-14T20:30:04Z) - Active RIS-aided EH-NOMA Networks: A Deep Reinforcement Learning
Approach [66.53364438507208]
An active reconfigurable intelligent surface (RIS)-aided multi-user downlink communication system is investigated.
Non-orthogonal multiple access (NOMA) is employed to improve spectral efficiency, and the active RIS is powered by energy harvesting (EH)
An advanced LSTM based algorithm is developed to predict users' dynamic communication state.
A DDPG based algorithm is proposed to joint control the amplification matrix and phase shift matrix RIS.
arXiv Detail & Related papers (2023-04-11T13:16:28Z) - The Wyner Variational Autoencoder for Unsupervised Multi-Layer Wireless
Fingerprinting [6.632671046812309]
We propose a multi-layer fingerprinting framework that jointly considers the multi-layer signatures for improved identification performance.
In contrast to previous works, by leveraging the recent multi-view machine learning paradigm, our method can cluster the device information shared among the multi-layer features without supervision.
Our empirical results show that the proposed method outperforms the state-of-the-art baselines in both supervised and unsupervised settings.
arXiv Detail & Related papers (2023-03-28T10:05:06Z) - Uncertainty Estimation by Fisher Information-based Evidential Deep
Learning [61.94125052118442]
Uncertainty estimation is a key factor that makes deep learning reliable in practical applications.
We propose a novel method, Fisher Information-based Evidential Deep Learning ($mathcalI$-EDL)
In particular, we introduce Fisher Information Matrix (FIM) to measure the informativeness of evidence carried by each sample, according to which we can dynamically reweight the objective loss terms to make the network more focused on the representation learning of uncertain classes.
arXiv Detail & Related papers (2023-03-03T16:12:59Z) - Perfectly Secure Steganography Using Minimum Entropy Coupling [60.154855689780796]
We show that a steganography procedure is perfectly secure under Cachin 1998's information-theoretic model of steganography.
We also show that, among perfectly secure procedures, a procedure maximizes information throughput if and only if it is induced by a minimum entropy coupling.
arXiv Detail & Related papers (2022-10-24T17:40:07Z) - Learning to Perform Downlink Channel Estimation in Massive MIMO Systems [72.76968022465469]
We study downlink (DL) channel estimation in a Massive multiple-input multiple-output (MIMO) system.
A common approach is to use the mean value as the estimate, motivated by channel hardening.
We propose two novel estimation methods.
arXiv Detail & Related papers (2021-09-06T13:42:32Z) - Safe RAN control: A Symbolic Reinforcement Learning Approach [62.997667081978825]
We present a Symbolic Reinforcement Learning (SRL) based architecture for safety control of Radio Access Network (RAN) applications.
We provide a purely automated procedure in which a user can specify high-level logical safety specifications for a given cellular network topology.
We introduce a user interface (UI) developed to help a user set intent specifications to the system, and inspect the difference in agent proposed actions.
arXiv Detail & Related papers (2021-06-03T16:45:40Z) - Hierarchical Deep CNN Feature Set-Based Representation Learning for
Robust Cross-Resolution Face Recognition [59.29808528182607]
Cross-resolution face recognition (CRFR) is important in intelligent surveillance and biometric forensics.
Existing shallow learning-based and deep learning-based methods focus on mapping the HR-LR face pairs into a joint feature space.
In this study, we desire to fully exploit the multi-level deep convolutional neural network (CNN) feature set for robust CRFR.
arXiv Detail & Related papers (2021-03-25T14:03:42Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.