Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning

被引:96
|
作者
Gohr, Aron [1 ]
机构
[1] BSI, Bonn, Germany
来源
关键词
Deep Learning; Differential cryptanalysis; Speck; CRYPTANALYSIS; GO; ALGORITHMS; GAME;
D O I
10.1007/978-3-030-26951-7_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper has four main contributions. First, we calculate the predicted difference distribution of Speck32/64 with one specific input difference under the Markov assumption completely for up to eight rounds and verify that this yields a globally fairly good model of the difference distribution of Speck32/64. Secondly, we show that contrary to conventional wisdom, machine learning can produce very powerful cryptographic distinguishers: for instance, in a simple low-data, chosen plain-text attack on nine rounds of Speck, we present distinguishers based on deep residual neural networks that achieve a mean key rank roughly five times lower than an analogous classical distinguisher using the full difference distribution table. Thirdly, we develop a highly selective key search policy based on a variant of Bayesian optimization which, together with our neural distinguishers, can be used to reduce the remaining security of 11-round Speck32/64 to roughly 38 bits. This is a significant improvement over previous literature. Lastly, we show that our neural distinguishers successfully use features of the ciphertext pair distribution that are invisible to all purely differential distinguishers even given unlimited data. While our attack is based on a known input difference taken from the literature, we also show that neural networks can be used to rapidly (within a matter of minutes on our machine) find good input differences without using prior human cryptanalysis. Supplementary code and data for this paper is available at https://github.com/agohr/deep speck.
引用
收藏
页码:150 / 179
页数:30
相关论文
共 50 条
  • [1] Improved Differential-Linear Attack with Application to Round-Reduced Speck32/64
    Wang, Feifan
    Wang, Gaoli
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2022, 2022, 13269 : 792 - 808
  • [2] Practical Attacks of Round-Reduced SIMON Based on Deep Learning
    HOU, Z. E. Z. H. O. U.
    REN, J. I. O. N. G. J. I. O. N. G.
    CHEN, S. H. A. O. Z. H. E. N.
    COMPUTER JOURNAL, 2023, 66 (10): : 2517 - 2534
  • [3] Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64
    Lyu, Lijun
    Tu, Yi
    Zhang, Yingjie
    INFORMATION SECURITY, ISC 2022, 2022, 13640 : 443 - 463
  • [4] Mixture Differential Cryptanalysis on Round-Reduced SIMON32/64 Using Machine Learning
    Wu, Zehan
    Qiao, Kexin
    Wang, Zhaoyang
    Cheng, Junjie
    Zhu, Liehuang
    MATHEMATICS, 2024, 12 (09)
  • [5] Improved Differential Cryptanalysis of Round-Reduced Speck
    Dinur, Itai
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2014, 2014, 8781 : 147 - 164
  • [6] Differential Cryptanalysis of Round-Reduced SIMON and SPECK
    Abed, Farzaneh
    List, Eik
    Lucks, Stefan
    Wenzel, Jakob
    FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 : 525 - 545
  • [7] Linear Attack on Round-Reduced DES Using Deep Learning
    Hou, Botao
    Li, Yongqiang
    Zhao, Haoyue
    Wu, Bin
    COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 131 - 145
  • [8] Cube attacks on round-reduced TinyJAMBU
    Teng, Wil Liam
    Salam, Iftekhar
    Yau, Wei-Chuen
    Pieprzyk, Josef
    Phan, Raphael C-W
    SCIENTIFIC REPORTS, 2022, 12 (01)
  • [9] Practical attacks on the round-reduced PRINCE
    Morawiecki, Pawel
    IET INFORMATION SECURITY, 2017, 11 (03) : 146 - 151
  • [10] Algebraic Attacks on Round-Reduced Keccak
    Liu, Fukang
    Isobe, Takanori
    Meier, Willi
    Yang, Zhonghao
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 91 - 110