Security Analysis of SIMON32/64 Based on Deep Learning

被引:0
|
作者
Wang H. [1 ]
Cong P. [1 ]
Jiang H. [1 ]
Wei Y. [1 ]
机构
[1] Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2021年 / 58卷 / 05期
关键词
Candidate key sieving; Deep learning; Differential cryptanalysis; Distinguisher; SIMON32/64;
D O I
10.7544/issn1000-1239.2021.20200900
中图分类号
学科分类号
摘要
With the rapid development of the Internet of Things, lightweight block cipher provides a solid foundation for the data security in various resource constrained environments. Currently, the security analysis of lightweight block ciphers tends to be more and more automated and intelligent. Applying deep learning to analyze the security of lightweight block ciphers appears to be a new research hotspot in this area. In this paper, the neural network technology is used to the security analysis of SIMON32/64, a lightweight block cipher algorithm released by the National Security Agency (NSA) in 2013. The feedforward neural network and the convolutional neural network are used to simulate the case of single input differential to multi output differential in multi differential cryptanalysis. Some deep learning distinguishers of 6-round (or even 9-round) reduced SIMON32/64 are designed, and both the advantages and disadvantages of the two neural network structures under different conditions are investigated. A candidate key sieving method for the 9-round reduced SIMON32/64 is also presented by extending the 7-round distinguisher of the feed-forward and the convolution neural networks, where one round forward and one round backward of this 7-round distinguisher are respectively considered. The experimental results show that 65535 candidate keys were dramatically reduced to 675 by only using 128 chosen plaintext pairs. Compared with the traditional differential distinguishers of reduced SIMON32/64, the new distinguishers combined with deep learning notably reduce both the time complexity and data complexity. © 2021, Science Press. All right reserved.
引用
收藏
页码:1056 / 1064
页数:8
相关论文
共 19 条
  • [1] Biham E, Shamir A., Differential cryptanalysis of DES-like cryptosystems, Journal of Cryptology, 4, 1, pp. 3-72, (1991)
  • [2] Li Zhixin, Wei Haiyang, Huang Feicheng, Et al., Combine visual features and scene semantics for image captioning, Chinese Journal of Computers, 43, 9, pp. 1624-1640, (2020)
  • [3] Liu Ye, Huang Jinxiao, Ma Yutao, An automatic method using hybrid neural networks and attention mechanism for software bug triaging, Journal of Computer Research and Development, 57, 3, pp. 461-473, (2020)
  • [4] Esteva A, Robicquet A, Ramsundar B, Et al., A guide to deep learning in healthcare, Nature Medicine, 25, 1, pp. 24-29, (2019)
  • [5] Das D, Golder A, Danial J, Et al., X-DeepSCA: Cross-device deep learning side channel attack, Proc of the 56th Annual Design Automation Conf, pp. 1-6, (2019)
  • [6] Abadi M, Andersen D G., Learning to protect communi-cations with adversarial neural cryptography, (2016)
  • [7] Rivest R L., Cryptography and machine learning, Proc of the Int Conf on the Theory and Application of Cryptology, pp. 427-439, (1991)
  • [8] Hu Xinyi, Zhao Yaqun, Research on plaintext restoration of AES based on neural network[J/OL], Security and Communication Networks, (2018)
  • [9] Gohr A., Improving attacks on round-reduced SPECK32/64 using deep learning, Proc of the Annual Int Cryptology Conf, pp. 150-179, (2019)
  • [10] Baksi A, Breier J, Dong Xiaoyang, Machine learning assisted differential distinguishers for lightweight ciphers[DB/OL], IACR Cryptology ePrint Archive