Dreaming of Keys: Introducing the Phantom Gradient Attack

Ã…vald Sommervoll

Abstract

We introduce a new cryptanalytical attack, the phantom gradient attack. The phantom gradient attack is a key recovery attack that draws its foundations from machine learning and backpropagation. This paper provides the first building block to a full phantom gradient attack by showing that it is effective on simple cryptographic functions. We also exemplify how the attack could be extended to attack some of ASCONs’ permutations, the cryptosystem that won CAESAR the competition for authenticated encryption: security, applicability, and robustness.

Download


Paper Citation


in Harvard Style

Sommervoll Ã…. (2021). Dreaming of Keys: Introducing the Phantom Gradient Attack.In Proceedings of the 7th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-491-6, pages 619-627. DOI: 10.5220/0010317806190627


in Bibtex Style

@conference{icissp21,
author={Ã…vald Sommervoll},
title={Dreaming of Keys: Introducing the Phantom Gradient Attack},
booktitle={Proceedings of the 7th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2021},
pages={619-627},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0010317806190627},
isbn={978-989-758-491-6},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 7th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Dreaming of Keys: Introducing the Phantom Gradient Attack
SN - 978-989-758-491-6
AU - Sommervoll Ã….
PY - 2021
SP - 619
EP - 627
DO - 10.5220/0010317806190627