Can Neural Networks spot the Sponge?
Loading...
Date
Authors
Gradoš, Matej
Advisor
Referee
Mark
Journal Title
Journal ISSN
Volume Title
Publisher
Vysoké učení technické v Brně, Fakulta elektrotechniky a komunikačních technologií
ORCID
Abstract
Cryptographic hash functions ensure data integrity and security in modern cryptographic systems. They are a core mechanism for digital signatures, authentication protocols, and blockchain technology, designed to make their output impossible to predict. Inspired by machine learning’s ability to approximate complex functions, we trained models of varying complexity to assess whether they can learn and replicate the behavior of cryptographic hash functions. Our study evaluates the extent to which these models are able to approximate the underlying mathematical operations, shedding light on potential vulnerabilities and theoretical limits of machine learning in cryptographic contexts.
Description
Keywords
Citation
Proceedings I of the 31st Conference STUDENT EEICT 2025: General papers. s. 153-156. ISBN 978-80-214-6321-9
https://www.eeict.cz/eeict_download/archiv/sborniky/EEICT_2025_sbornik_1.pdf
https://www.eeict.cz/eeict_download/archiv/sborniky/EEICT_2025_sbornik_1.pdf
Document type
Peer-reviewed
Document version
Published version
Date of access to the full text
Language of document
en
