DeepAI AI Chat
Log In Sign Up

Neural Cryptanalysis: Metrics, Methodology, and Applications in CPS Ciphers

by   Ya Xiao, et al.

Many real-world cyber-physical systems (CPS) use proprietary cipher algorithms. In this work, we describe an easy-to-use black-box security evaluation approach to measure the strength of proprietary ciphers without having to know the algorithms. We quantify the strength of a cipher by measuring how difficult it is for a neural network to mimic the cipher algorithm. We define new metrics (e.g., cipher match rate, training data complexity and training time complexity) that are computed from neural networks to quantitatively represent the cipher strength. This measurement approach allows us to directly compare the security of ciphers. Our experimental demonstration utilizes fully connected neural networks with multiple parallel binary classifiers at the output layer. The results show that when compared with round-reduced DES, the security strength of Hitag2 (a popular stream cipher used in the keyless entry of modern cars) is weaker than 3-round DES.


page 1

page 2

page 3

page 4


A Security Cost Modelling Framework for Cyber-Physical Systems

Cyber-Physical Systems (CPS) are formed through interconnected component...

The TeamPlay Project: Analysing and Optimising Time, Energy, and Security for Cyber-Physical Systems

Non-functional properties, such as energy, time, and security (ETS) are ...

Robustness Analysis for Battery Supported Cyber-Physical Systems

This paper establishes a novel analytical approach to quantify robustnes...

Modelling Controllers for Cyber Physical Systems Using Neural Networks

Model Predictive Controllers (MPC) are widely used for controlling cyber...

A new neural-network-based model for measuring the strength of a pseudorandom binary sequence

Maximum order complexity is an important tool for measuring the nonlinea...

How to Quantify the Security Level of Embedded Systems? A Taxonomy of Security Metrics

Embedded Systems (ES) development has been historically focused on funct...

The Generation of Security Scoring Systems Leveraging Human Expert Opinion

While the existence of many security elements can be measured (e.g., vul...