Improved Machine Learning Assisted (Related-key) Differential Distinguishers For Lightweight Ciphers

被引:6
|
作者
Wang, Gao [1 ]
Wang, Gaoli [1 ,2 ]
He, Yu [1 ]
机构
[1] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
来源
2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021) | 2021年
基金
中国国家自然科学基金;
关键词
related-key) differential distinguisher; machine learning; lightweight ciphers; speck; present; SECURITY EVALUATION; CRYPTANALYSIS; AES;
D O I
10.1109/TrustCom53373.2021.00039
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
At CRYPTO 2019, Gohr first proposes a deep learning based attack on round-reduced Speck32/64. It is an all-in-one differential approach under the Markov assumption. Then Baksi presents the method for non-Markov ciphers and applies it to Gimli by simulating the all-in-one differentials. However, all studies are still only for single-key differential distinguishers and the selection of input difference is based on traditional cryptanalysis. Inspired by the work of Gohr and Baksi, we extend and apply machine learning techniques to related-key differential distinguishers for the first time and propose a novel approach to develop (related-key) differential distinguishers without using prior cryptanalysis. We experimentally show that the differences with low Hamming weights are more suitable for building distinguishers. Then we present an exhaustive algorithm and a greedy algorithm to find an appreciable difference for the distinguisher. Finally, to obtain a suitable machine model for distinguishers, we adopt a Bayesian optimization tool named Hyperopt for parameter optimization and model selection. As proof of works, we apply our method to round-reduced Speck32/64, Present64/80 and get some improved cryptanalysis results.
引用
收藏
页码:164 / 171
页数:8
相关论文
共 50 条
  • [21] Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILP
    Wang, Xuzi
    Wu, Baofeng
    Hou, Lin
    Lin, Dongdai
    INFORMATION SECURITY (ISC 2018), 2018, 11060 : 116 - 131
  • [22] On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers
    Hosoyamada, Akinori
    Aoki, Kazumaro
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 3 - 18
  • [23] On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers
    Hosoyamada, Akinori
    Aoki, Kazumaro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01): : 27 - 34
  • [24] SAT-Based Analysis of Related-Key Impossible Distinguishers on Piccolo and (Tweakable) TWINE
    Utsumi, Shion
    Sakamoto, Kosei
    Isobe, Takanori
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2024, E107A (08) : 1186 - 1195
  • [25] Understanding the Related-Key Security of Feistel Ciphers From a Provable Perspective
    Guo, Chun
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (08) : 5260 - 5280
  • [26] Improved Related-Key Rectangle Attacks On GIFT
    Yu, Qingyuan
    Qin, Lingyue
    Dong, Xiaoyang
    Jia, Keting
    COMPUTER JOURNAL, 2024, 67 (04): : 1443 - 1456
  • [27] Related-key impossible differential attacks on LBlock
    Chongqing University of Posts and Telecommunications, Chongqing
    400065, China
    不详
    Henan
    450004, China
    不详
    Sichuan
    611830, China
    不详
    100000, China
    Tien Tzu Hsueh Pao, 10 (1948-1953):
  • [28] Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks
    Sun, Siwei
    Hu, Lei
    Song, Ling
    Xie, Yonghong
    Wang, Peng
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 39 - 51
  • [29] Related-Key Impossible Differential Cryptanalysis of LBlock
    XIE Min
    LI Jingjing
    ZANG Yuechuan
    Chinese Journal of Electronics, 2017, 26 (01) : 35 - 41
  • [30] Related-Key Impossible Differential Cryptanalysis of LBlock
    Xie Min
    Li Jingjing
    Zang Yuechuan
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (01) : 35 - 41