Deep Learning-Based Hash Function Cryptanalysis

Ongee Jeong, Inkyu Moon

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper analyzes the strength of Message Digest Algorithm (MD5) by performing deep learning-based Encryption Emulation (EE) and Plaintext Recovery (PR) attacks. We convert randomly generated S12-bit arrays, messages, into 128-bit arrays, digests, with MD5 in different numbers of steps. Furthermore, two different structures of deep learning models, fully-connected neural network and Bidirectional Long Short-Term Memory (BiLSTM), are used in attacks and trained to analyze MD5 automatically. As a result, the BiLSTM shows better prediction accuracy than the fully-connected neural network. Moreover, the PR attack is more challenging than the EE attack.

Original languageEnglish
Title of host publicationICTC 2024 - 15th International Conference on ICT Convergence
Subtitle of host publicationAI-Empowered Digital Innovation
PublisherIEEE Computer Society
Pages1302-1303
Number of pages2
ISBN (Electronic)9798350364637
DOIs
StatePublished - 2024
Event15th International Conference on Information and Communication Technology Convergence, ICTC 2024 - Jeju Island, Korea, Republic of
Duration: 16 Oct 202418 Oct 2024

Publication series

NameInternational Conference on ICT Convergence
ISSN (Print)2162-1233
ISSN (Electronic)2162-1241

Conference

Conference15th International Conference on Information and Communication Technology Convergence, ICTC 2024
Country/TerritoryKorea, Republic of
CityJeju Island
Period16/10/2418/10/24

Bibliographical note

Publisher Copyright:
© 2024 IEEE.

Keywords

  • cryptanalysis
  • deep learning
  • hash function
  • message digest algorithms
  • neural network

Fingerprint

Dive into the research topics of 'Deep Learning-Based Hash Function Cryptanalysis'. Together they form a unique fingerprint.

Cite this