Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning

被引:97
|
作者
Gohr, Aron [1 ]
机构
[1] BSI, Bonn, Germany
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II | 2019年 / 11693卷
关键词
Deep Learning; Differential cryptanalysis; Speck; CRYPTANALYSIS; GO; ALGORITHMS; GAME;
D O I
10.1007/978-3-030-26951-7_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper has four main contributions. First, we calculate the predicted difference distribution of Speck32/64 with one specific input difference under the Markov assumption completely for up to eight rounds and verify that this yields a globally fairly good model of the difference distribution of Speck32/64. Secondly, we show that contrary to conventional wisdom, machine learning can produce very powerful cryptographic distinguishers: for instance, in a simple low-data, chosen plain-text attack on nine rounds of Speck, we present distinguishers based on deep residual neural networks that achieve a mean key rank roughly five times lower than an analogous classical distinguisher using the full difference distribution table. Thirdly, we develop a highly selective key search policy based on a variant of Bayesian optimization which, together with our neural distinguishers, can be used to reduce the remaining security of 11-round Speck32/64 to roughly 38 bits. This is a significant improvement over previous literature. Lastly, we show that our neural distinguishers successfully use features of the ciphertext pair distribution that are invisible to all purely differential distinguishers even given unlimited data. While our attack is based on a known input difference taken from the literature, we also show that neural networks can be used to rapidly (within a matter of minutes on our machine) find good input differences without using prior human cryptanalysis. Supplementary code and data for this paper is available at https://github.com/agohr/deep speck.
引用
收藏
页码:150 / 179
页数:30
相关论文
共 50 条
  • [31] Practical Key-Recovery Attacks On Round-Reduced Ketje Jr, Xoodoo-AE And Xoodyak
    Zhou, Haibo
    Li, Zheng
    Dong, Xiaoyang
    Jia, Keting
    Meier, Willi
    COMPUTER JOURNAL, 2020, 63 (08) : 1231 - 1246
  • [32] Security Analysis of SIMON32/64 Based on Deep Learning
    Wang H.
    Cong P.
    Jiang H.
    Wei Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (05): : 1056 - 1064
  • [33] A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique
    Hao, Yonglin
    Bai, Dongxia
    Li, Leibo
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 166 - 183
  • [34] Meet-in-the-Middle Attacks on Reduced-Round QARMA-64/128
    Li, Rongjia
    Jin, Chenhui
    COMPUTER JOURNAL, 2018, 61 (08) : 1158 - 1165
  • [35] Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160
    Wang, Gaoli
    Liu, Fukang
    Cui, Binbin
    Mendel, Florian
    Dobraunig, Christoph
    DESIGNS CODES AND CRYPTOGRAPHY, 2020, 88 (05) : 887 - 930
  • [36] Improved Quantum Rebound Attacks on Double Block Length Hashing with Round-Reduced AES-256 and ARIA-256
    Lee, Dongjae
    Hong, Seokhie
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (03) : 238 - 265
  • [37] Improving deep learning-based neural distinguisher with multiple ciphertext pairs for speck and Simon
    Hou, Yufei
    Liu, Jie
    Han, Shouxu
    Ma, Zhongjun
    Ye, Xi
    Nie, Xuan
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [38] Improving the Security of the LCB Block Cipher Against Deep Learning-Based Attacks
    Aishwarya, Indrakanti
    Viswanathan, Lakshmy Koduvayur
    Srinivasan, Chungath
    Mishra, Girish
    Pal, Saibal K.
    Sethumadhavan, M.
    CRYPTOGRAPHY, 2024, 8 (04)
  • [39] Multiple Differential Distinguisher of SIMECK32/64 Based on Deep Learning
    Wang, Huijiao
    Tian, Jiapeng
    Zhang, Xin
    Wei, Yongzhuang
    Jiang, Hua
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [40] Identification of Network Attacks Using a Deep Learning Approach
    Altwaijry, Najwa
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (04): : 201 - 207