Assessing Cryptographic Random Number Generators using Machine Learning
Loading...
Date
Authors
Gradoš, Matej
Advisor
Referee
Mark
A
Journal Title
Journal ISSN
Volume Title
Publisher
Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií
ORCID
Abstract
This thesis investigates the intersection of machine learning and cryptography, with a particular emphasis on the capacity of neural networks to model cryptographic hash functions and evaluation of randomness in binary sequences. The feasibility of training neural networks to replicate the behavior of cryptographic hash functions, focusing on a reduced variant of the SHA-3 algorithm. Empirical results indicate that while neural networks can accurately approximate steps of the Keccak- permutation, they exhibit limited generalization capability across multiple rounds of the Keccak- function. In the second phase, the focus shifts to the application of machine learning techniques for the analysis of randomness in binary sequences. Utilizing transformer-based architectures, thesis demonstrates that these models can achieve high predictive accuracy on the final bit of a sequence, including those classified random by conventional statistical test suites such as NIST SP800-22. These findings suggest that machine learning models may serve as practical complementary tools to traditional statistical methods, offering a novel approach for uncovering subtle, exploitable patterns that dodge standard randomness assessments.
This thesis investigates the intersection of machine learning and cryptography, with a particular emphasis on the capacity of neural networks to model cryptographic hash functions and evaluation of randomness in binary sequences. The feasibility of training neural networks to replicate the behavior of cryptographic hash functions, focusing on a reduced variant of the SHA-3 algorithm. Empirical results indicate that while neural networks can accurately approximate steps of the Keccak- permutation, they exhibit limited generalization capability across multiple rounds of the Keccak- function. In the second phase, the focus shifts to the application of machine learning techniques for the analysis of randomness in binary sequences. Utilizing transformer-based architectures, thesis demonstrates that these models can achieve high predictive accuracy on the final bit of a sequence, including those classified random by conventional statistical test suites such as NIST SP800-22. These findings suggest that machine learning models may serve as practical complementary tools to traditional statistical methods, offering a novel approach for uncovering subtle, exploitable patterns that dodge standard randomness assessments.
This thesis investigates the intersection of machine learning and cryptography, with a particular emphasis on the capacity of neural networks to model cryptographic hash functions and evaluation of randomness in binary sequences. The feasibility of training neural networks to replicate the behavior of cryptographic hash functions, focusing on a reduced variant of the SHA-3 algorithm. Empirical results indicate that while neural networks can accurately approximate steps of the Keccak- permutation, they exhibit limited generalization capability across multiple rounds of the Keccak- function. In the second phase, the focus shifts to the application of machine learning techniques for the analysis of randomness in binary sequences. Utilizing transformer-based architectures, thesis demonstrates that these models can achieve high predictive accuracy on the final bit of a sequence, including those classified random by conventional statistical test suites such as NIST SP800-22. These findings suggest that machine learning models may serve as practical complementary tools to traditional statistical methods, offering a novel approach for uncovering subtle, exploitable patterns that dodge standard randomness assessments.
Description
Keywords
Machine Learning , Neural Networks , Cryptographic Hash Functions , Secure Hash Algorithm , SHA-3 , SHA-3 Toy Function , randomness , Transformer architecture , high entropy , Machine Learning , Neural Networks , Cryptographic Hash Functions , Secure Hash Algorithm , SHA-3 , SHA-3 Toy Function , randomness , Transformer architecture , high entropy
Citation
GRADOŠ, M. Assessing Cryptographic Random Number Generators using Machine Learning [online]. Brno: Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií. 2025.
Document type
Document version
Date of access to the full text
Language of document
en
Study field
bez specializace
Comittee
doc. Ing. Jan Jeřábek, Ph.D. (místopředseda)
M.Sc. Sara Ricci, Ph.D. (člen)
Ing. Martin Štůsek, Ph.D. (člen)
Ing. Pavel Paluřík (člen)
Ing. Willi Lazarov (člen)
prof. Ing. Miroslav Vozňák, Ph.D. (předseda)
Date of acceptance
2025-06-09
Defence
Student presented the results of his thesis and the committee got familiar with reviewer's report.
Student defended his Diploma Thesis and answered the questions from the members of the committee and the reviewer.
Result of defence
práce byla úspěšně obhájena
