Can Neural Networks spot the Sponge?

Loading...
Thumbnail Image

Date

Authors

Gradoš, Matej

Advisor

Referee

Mark

Journal Title

Journal ISSN

Volume Title

Publisher

Vysoké učení technické v Brně, Fakulta elektrotechniky a komunikačních technologií

ORCID

Abstract

Cryptographic hash functions ensure data integrity and security in modern cryptographic systems. They are a core mechanism for digital signatures, authentication protocols, and blockchain technology, designed to make their output impossible to predict. Inspired by machine learning’s ability to approximate complex functions, we trained models of varying complexity to assess whether they can learn and replicate the behavior of cryptographic hash functions. Our study evaluates the extent to which these models are able to approximate the underlying mathematical operations, shedding light on potential vulnerabilities and theoretical limits of machine learning in cryptographic contexts.

Description

Citation

Proceedings I of the 31st Conference STUDENT EEICT 2025: General papers. s. 153-156. ISBN 978-80-214-6321-9
https://www.eeict.cz/eeict_download/archiv/sborniky/EEICT_2025_sbornik_1.pdf

Document type

Peer-reviewed

Document version

Published version

Date of access to the full text

Language of document

en

Study field

Comittee

Date of acceptance

Defence

Result of defence

DOI

Endorsement

Review

Supplemented By

Referenced By

Citace PRO