Go to file
2021-09-22 10:38:39 +02:00
.gitignore Better loss tracking and implemented saving of network-wheights 2021-09-21 09:49:27 +02:00
discriminate.py Increased layer count of model and refactored model into its own file 2021-09-22 10:38:09 +02:00
model.py Increased layer count of model and refactored model into its own file 2021-09-22 10:38:09 +02:00
README.md Updated README and better epoch-printing 2021-09-22 10:28:08 +02:00
shark.py Fixed a problem in model-training and renamed files 2021-09-22 09:14:23 +02:00
train.py Increased layer count of model and refactored model into its own file 2021-09-22 10:38:09 +02:00
wh_discriminator.n Sucessful discrimination; updated README 2021-09-21 16:00:43 +02:00

Shark

Shark is a sha256+xor based encryption.
I made it because I want to try to break it.
(Precisely: Show it does not provide semantic security, because it is not IND-CPA-secure)
This will work iff I succeed in building a PPT-discriminator for sha256 from randomness
As my first approach this discriminator will be based on an LSTM-network.
Update: This worked out way better than expected; given long enought sequences (128 Bytes are more than enough) we can discriminate successfully in 100% of cases.
Update: I did an upsie in the training-code and the discriminator is actually shit.