Improved Machine Learning Assisted (Related-key) Differential Distinguishers For Lightweight Ciphers

被引:6
|
作者
Wang, Gao [1 ]
Wang, Gaoli [1 ,2 ]
He, Yu [1 ]
机构
[1] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
来源
2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021) | 2021年
基金
中国国家自然科学基金;
关键词
related-key) differential distinguisher; machine learning; lightweight ciphers; speck; present; SECURITY EVALUATION; CRYPTANALYSIS; AES;
D O I
10.1109/TrustCom53373.2021.00039
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
At CRYPTO 2019, Gohr first proposes a deep learning based attack on round-reduced Speck32/64. It is an all-in-one differential approach under the Markov assumption. Then Baksi presents the method for non-Markov ciphers and applies it to Gimli by simulating the all-in-one differentials. However, all studies are still only for single-key differential distinguishers and the selection of input difference is based on traditional cryptanalysis. Inspired by the work of Gohr and Baksi, we extend and apply machine learning techniques to related-key differential distinguishers for the first time and propose a novel approach to develop (related-key) differential distinguishers without using prior cryptanalysis. We experimentally show that the differences with low Hamming weights are more suitable for building distinguishers. Then we present an exhaustive algorithm and a greedy algorithm to find an appreciable difference for the distinguisher. Finally, to obtain a suitable machine model for distinguishers, we adopt a Bayesian optimization tool named Hyperopt for parameter optimization and model selection. As proof of works, we apply our method to round-reduced Speck32/64, Present64/80 and get some improved cryptanalysis results.
引用
收藏
页码:164 / 171
页数:8
相关论文
共 50 条
  • [31] Related-key Impossible Differential Attack on Piccolo
    Xu L.-H.
    Guo J.-S.
    Cui J.-Y.
    Li M.-M.
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 (08): : 2349 - 2361
  • [32] Improved related-key attacks on DESX and DESX
    Phan, Raphael C. -W.
    Shamir, Adi
    CRYPTOLOGIA, 2008, 32 (01) : 13 - 22
  • [33] Related-key attacks on the Py-family of ciphers and an approach to repair the weaknesses
    Sekar, Gautham
    Paul, Souradyuti
    Preneel, Bart
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 58 - 72
  • [34] A General Framework for the Related-Key Linear Attack Against Block Ciphers with Linear Key Schedules
    Lee, Jung-Keun
    Koo, Bonwook
    Kim, Woo-Hwan
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2019, 2020, 11959 : 194 - 224
  • [35] Related-Key Zero-Correlation Linear Attacks on Block Ciphers with Linear Key Schedules
    Yi, Zhang
    Kai, Zhang
    Ting, Cui
    CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (03) : 672 - 682
  • [36] Related-key attacks on the Py-family of ciphers and an approach to repair the weaknesses
    Katholieke Universiteit Leuven, Dept. ESAT/COSIC, Kasteelpark Arenberg 10, B-3001, Leuven-Heverlee, Belgium
    Lect. Notes Comput. Sci., (58-72):
  • [37] Security of Related-Key Differential Attacks on TWINE, Revisited
    Sakamoto, Kosei
    Minematsu, Kazuhiko
    Shibata, Nao
    Shigeri, Maki
    Kubo, Hiroyasu
    Funabiki, Yuki
    Isobe, Takanori
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 212 - 214
  • [38] Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
    Boxin Zhao
    Xiaoyang Dong
    Willi Meier
    Keting Jia
    Gaoli Wang
    Designs, Codes and Cryptography, 2020, 88 : 1103 - 1126
  • [39] Related-Key Impossible Differential Analysis of Full Khudra
    Yang, Qianqian
    Hu, Lei
    Sun, Siwei
    Song, Ling
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2016, 2016, 9836 : 135 - 146
  • [40] Related-Key Differential Cryptanalysis of Full Round CRAFT
    ElSheikh, Muhammad
    Youssef, Amr M.
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2019, 2019, 11947 : 50 - 66