Output Prediction Attacks on Block Ciphers Using Deep Learning

被引:1
|
作者
Kimura, Hayato [1 ,2 ]
Emura, Keita [2 ]
Isobe, Takanori [2 ,3 ]
Ito, Ryoma [2 ]
Ogawa, Kazuto [2 ]
Ohigashi, Toshihiro [1 ,2 ]
机构
[1] Tokai Univ, Minato Ku, Tokyo, Japan
[2] Natl Inst Informat & Commun Technol NICT, Koganei, Tokyo, Japan
[3] Univ Hyogo, Kobe, Hyogo, Japan
关键词
Deep learning; Block cipher; SPN; Feistel; GENERIC EXTENSION;
D O I
10.1007/978-3-031-16815-4_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose deep learning-based output prediction attacks in a blackbox setting. As preliminary experiments, we first focus on two toy SPN block ciphers (small PRESENT-[4] and small AES-[4]) and one toy Feistel block cipher (small TWINE-[4]). Due to its small internal structures with a block size of 16 bits, we can construct deep learning models by employing the maximum number of plaintext/ciphertext pairs, and we can precisely calculate the rounds in which full diffusion occurs. Next, based on the preliminary experiments, we explore whether the evaluation results obtained by our attacks against three toy block ciphers can be applied to block ciphers with large block sizes, e.g., 32 and 64 bits. As a result, we demonstrate the following results, specifically for the SPN block ciphers: (1) our attacks work against a similar number of rounds that the linear/differential attacks can be successful, (2) our attacks realize output predictions (precisely ciphertext prediction and plaintext recovery) that are much stronger than distinguishing attacks, and (3) swapping or replacing the internal components of the target block ciphers affects the average success probabilities of the proposed attacks. It is particularly worth noting that this is a deep learning specific characteristic because swapping/replacing does not affect the average success probabilities of the linear/differential attacks. We also confirm whether the proposed attacks work on the Feistel block cipher. We expect that our results will be an important stepping stone in the design of deep learning-resistant symmetric-key ciphers.
引用
收藏
页码:248 / 276
页数:29
相关论文
共 50 条
  • [21] Detecting block ciphers generic attacks: An instance-based machine learning method
    Alsariera, Yazan Ahmad
    INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES, 2022, 9 (05): : 60 - 68
  • [22] Building Secure Block Ciphers on Generic Attacks Assumptions
    Patarin, Jacques
    Seurin, Yannick
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5381 : 66 - 81
  • [23] DISTINGUISHING ATTACKS ON BLOCK CIPHERS BY DIFFERENTIALS OF TWO-BLOCK TEXTS
    Denisov, O., V
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2020, (48): : 43 - 62
  • [24] Further Analysis of Block Ciphers against Timing Attacks
    LI Wei~ 1
    2. State Key Laboratory of Modern Communications
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1629 - 1632
  • [25] Attacks of simple block ciphers via efficient heuristics
    Nalini, N.
    Rao, G. Raghavendra
    INFORMATION SCIENCES, 2007, 177 (12) : 2553 - 2569
  • [26] Systematic Construction of Nonlinear Product Attacks on Block Ciphers
    Courtois, Nicolas T.
    Abbondati, Matteo
    Ratoanina, Hamy
    Grajek, Marek
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 20 - 51
  • [27] Stream/block ciphers, difference equations and algebraic attacks
    La Scala, Roberto
    Tiwari, Sharwan K.
    JOURNAL OF SYMBOLIC COMPUTATION, 2022, 109 : 177 - 198
  • [28] Impossible differential attacks on the SKINNY family of block ciphers
    Yang, Dong
    Qi, Wen-Feng
    Chen, Hua-Jin
    IET INFORMATION SECURITY, 2017, 11 (06) : 377 - 385
  • [29] Exhaustive Deep Learning Power Analysis for Secure Block Ciphers and Its Evaluation
    Takemoto S.
    Ikezaki Y.
    Nozaki Y.
    Yoshikawa M.
    IEEJ Transactions on Electronics, Information and Systems, 2024, 144 (01) : 7 - 14
  • [30] On the effects of neural network-based output prediction attacks on the design of symmetric-key ciphers
    Watanabe, Hayato
    Ito, Ryoma
    Ohigashi, Toshihiro
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 90