Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning

被引:97
|
作者
Gohr, Aron [1 ]
机构
[1] BSI, Bonn, Germany
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II | 2019年 / 11693卷
关键词
Deep Learning; Differential cryptanalysis; Speck; CRYPTANALYSIS; GO; ALGORITHMS; GAME;
D O I
10.1007/978-3-030-26951-7_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper has four main contributions. First, we calculate the predicted difference distribution of Speck32/64 with one specific input difference under the Markov assumption completely for up to eight rounds and verify that this yields a globally fairly good model of the difference distribution of Speck32/64. Secondly, we show that contrary to conventional wisdom, machine learning can produce very powerful cryptographic distinguishers: for instance, in a simple low-data, chosen plain-text attack on nine rounds of Speck, we present distinguishers based on deep residual neural networks that achieve a mean key rank roughly five times lower than an analogous classical distinguisher using the full difference distribution table. Thirdly, we develop a highly selective key search policy based on a variant of Bayesian optimization which, together with our neural distinguishers, can be used to reduce the remaining security of 11-round Speck32/64 to roughly 38 bits. This is a significant improvement over previous literature. Lastly, we show that our neural distinguishers successfully use features of the ciphertext pair distribution that are invisible to all purely differential distinguishers even given unlimited data. While our attack is based on a known input difference taken from the literature, we also show that neural networks can be used to rapidly (within a matter of minutes on our machine) find good input differences without using prior human cryptanalysis. Supplementary code and data for this paper is available at https://github.com/agohr/deep speck.
引用
收藏
页码:150 / 179
页数:30
相关论文
共 50 条
  • [21] Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
    Derbez, Patrick
    Perrin, Leo
    FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 190 - 216
  • [22] Improved Conditional Differential Attacks on Round-Reduced Grain v1
    Li, Jun-Zhi
    Guan, Jie
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (09): : 4548 - 4559
  • [23] MILP-Based Differential Cryptanalysis on Round-Reduced Midori64
    Zhao, Hongluan
    Han, Guoyong
    Wang, Letian
    Wang, Wen
    IEEE ACCESS, 2020, 8 : 95888 - 95896
  • [24] Truncated differential based known-key attacks on round-reduced SIMON
    Hao, Yonglin
    Meier, Willi
    DESIGNS CODES AND CRYPTOGRAPHY, 2017, 83 (02) : 467 - 492
  • [25] Truncated differential based known-key attacks on round-reduced SIMON
    Yonglin Hao
    Willi Meier
    Designs, Codes and Cryptography, 2017, 83 : 467 - 492
  • [26] Preimage Attacks on Round-Reduced KECCAK-224/256 via an Allocating Approach
    Li, Ting
    Sun, Yao
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT III, 2019, 11478 : 556 - 584
  • [27] Improved related-tweakey rectangle attacks on round-reduced Deoxys-BC
    Liu, Jiamei
    Tan, Lin
    Xu, Hong
    IET INFORMATION SECURITY, 2023, 17 (03) : 407 - 422
  • [28] Fast Chosen-Key Distinguish Attacks on Round-Reduced AES-192
    Zhu, Chunbo
    Wang, Gaoli
    Zhu, Boyu
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 573 - 587
  • [29] Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512
    Chen, Jiazhe
    Jia, Keting
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 1 - 18
  • [30] Cryptanalysis of Round-Reduced KECCAK Using Non-linear Structures
    Rajasree, Mahesh Sreekumar
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2019, 2019, 11898 : 175 - 192