Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning

被引:96
|
作者
Gohr, Aron [1 ]
机构
[1] BSI, Bonn, Germany
来源
关键词
Deep Learning; Differential cryptanalysis; Speck; CRYPTANALYSIS; GO; ALGORITHMS; GAME;
D O I
10.1007/978-3-030-26951-7_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper has four main contributions. First, we calculate the predicted difference distribution of Speck32/64 with one specific input difference under the Markov assumption completely for up to eight rounds and verify that this yields a globally fairly good model of the difference distribution of Speck32/64. Secondly, we show that contrary to conventional wisdom, machine learning can produce very powerful cryptographic distinguishers: for instance, in a simple low-data, chosen plain-text attack on nine rounds of Speck, we present distinguishers based on deep residual neural networks that achieve a mean key rank roughly five times lower than an analogous classical distinguisher using the full difference distribution table. Thirdly, we develop a highly selective key search policy based on a variant of Bayesian optimization which, together with our neural distinguishers, can be used to reduce the remaining security of 11-round Speck32/64 to roughly 38 bits. This is a significant improvement over previous literature. Lastly, we show that our neural distinguishers successfully use features of the ciphertext pair distribution that are invisible to all purely differential distinguishers even given unlimited data. While our attack is based on a known input difference taken from the literature, we also show that neural networks can be used to rapidly (within a matter of minutes on our machine) find good input differences without using prior human cryptanalysis. Supplementary code and data for this paper is available at https://github.com/agohr/deep speck.
引用
收藏
页码:150 / 179
页数:30
相关论文
共 50 条
  • [41] Differential-Linear Cryptanalysis of Round-Reduced SPARX-64/128
    Xu, Zhichao
    Xu, Hong
    Tan, Lin
    Qi, Wenfeng
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT II, 2024, 14527 : 193 - 208
  • [42] MILP-Based Differential Cryptanalysis on Round-Reduced Midori64
    Zhao, Hongluan
    Han, Guoyong
    Wang, Letian
    Wang, Wen
    IEEE ACCESS, 2020, 8 : 95888 - 95896
  • [43] Truncated Differential-Neural Key Recovery Attacks on Round-Reduced HIGHT
    Seok, Byoungjin
    ELECTRONICS, 2024, 13 (20)
  • [44] Truncated differential based known-key attacks on round-reduced SIMON
    Hao, Yonglin
    Meier, Willi
    DESIGNS CODES AND CRYPTOGRAPHY, 2017, 83 (02) : 467 - 492
  • [45] Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128
    Cui, Jiamin
    Hu, Kai
    Wang, Qingju
    Wang, Meiqin
    TOPICS IN CRYPTOLOGY, CT-RSA 2022, 2022, 13161 : 223 - 246
  • [46] Truncated differential based known-key attacks on round-reduced SIMON
    Yonglin Hao
    Willi Meier
    Designs, Codes and Cryptography, 2017, 83 : 467 - 492
  • [47] Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128
    Cui, Jiamin
    Hu, Kai
    Wang, Qingju
    Wang, Meiqin
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2022, 13161 LNCS : 223 - 246
  • [48] New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC
    YE Chendong
    TIAN Tian
    ChineseJournalofElectronics, 2019, 28 (04) : 698 - 705
  • [49] Non-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced KECCAK
    Song, Ling
    Liao, Guohong
    Guo, Jian
    ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II, 2017, 10402 : 428 - 451
  • [50] Preimage and pseudo collision attacks on round-reduced DHA-256 hash function
    Zou, Jian
    Wu, Wen-Ling
    Wu, Shuang
    Dong, Le
    Tongxin Xuebao/Journal on Communications, 2013, 34 (06): : 8 - 15