Output Prediction Attacks on Block Ciphers Using Deep Learning

被引:1
|
作者
Kimura, Hayato [1 ,2 ]
Emura, Keita [2 ]
Isobe, Takanori [2 ,3 ]
Ito, Ryoma [2 ]
Ogawa, Kazuto [2 ]
Ohigashi, Toshihiro [1 ,2 ]
机构
[1] Tokai Univ, Minato Ku, Tokyo, Japan
[2] Natl Inst Informat & Commun Technol NICT, Koganei, Tokyo, Japan
[3] Univ Hyogo, Kobe, Hyogo, Japan
关键词
Deep learning; Block cipher; SPN; Feistel; GENERIC EXTENSION;
D O I
10.1007/978-3-031-16815-4_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose deep learning-based output prediction attacks in a blackbox setting. As preliminary experiments, we first focus on two toy SPN block ciphers (small PRESENT-[4] and small AES-[4]) and one toy Feistel block cipher (small TWINE-[4]). Due to its small internal structures with a block size of 16 bits, we can construct deep learning models by employing the maximum number of plaintext/ciphertext pairs, and we can precisely calculate the rounds in which full diffusion occurs. Next, based on the preliminary experiments, we explore whether the evaluation results obtained by our attacks against three toy block ciphers can be applied to block ciphers with large block sizes, e.g., 32 and 64 bits. As a result, we demonstrate the following results, specifically for the SPN block ciphers: (1) our attacks work against a similar number of rounds that the linear/differential attacks can be successful, (2) our attacks realize output predictions (precisely ciphertext prediction and plaintext recovery) that are much stronger than distinguishing attacks, and (3) swapping or replacing the internal components of the target block ciphers affects the average success probabilities of the proposed attacks. It is particularly worth noting that this is a deep learning specific characteristic because swapping/replacing does not affect the average success probabilities of the linear/differential attacks. We also confirm whether the proposed attacks work on the Feistel block cipher. We expect that our results will be an important stepping stone in the design of deep learning-resistant symmetric-key ciphers.
引用
收藏
页码:248 / 276
页数:29
相关论文
共 50 条
  • [31] Algebraic attacks on a class of stream ciphers with unknown output function
    N. Rajesh Pillai
    S. S. Bedi
    Designs, Codes and Cryptography, 2013, 69 : 317 - 330
  • [32] ON POSSIBILITY OF USING CONVOLUTIONAL NEURAL NETWORKS FOR CREATING UNIVERSAL ATTACKS ON ITERATIVE BLOCK CIPHERS
    Perov, A. A.
    Pestunov, A., I
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2020, (49): : 46 - 56
  • [33] Algebraic attacks on a class of stream ciphers with unknown output function
    Pillai, N. Rajesh
    Bedi, S. S.
    DESIGNS CODES AND CRYPTOGRAPHY, 2013, 69 (03) : 317 - 330
  • [34] Fault Template Attacks on Block Ciphers Exploiting Fault Propagation
    Saha, Sayandeep
    Bag, Arnab
    Roy, Debapriya Basu
    Patranabis, Sikhar
    Mukhopadhyay, Debdeep
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 612 - 643
  • [35] Designing against a class of algebraic attacks on symmetric block ciphers
    Adams, C
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2006, 17 (01) : 17 - 27
  • [36] Self-similarity attacks on block ciphers and application to KeeLoq
    Courtois, Nicolas T.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, 6805 LNCS : 55 - 66
  • [37] New Birthday Attacks on Some MACS Based on Block Ciphers
    Yuan, Zheng
    Tang, Wei
    Jia, Keting
    Xu, Guangwu
    Wang, Xiaoyun
    ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 209 - +
  • [38] Designing against a class of algebraic attacks on symmetric block ciphers
    Carlisle Adams
    Applicable Algebra in Engineering, Communication and Computing, 2006, 17 : 17 - 27
  • [39] A deep learning-based side channel attack model for different block ciphers
    Li, Lang
    Ou, Yu
    JOURNAL OF COMPUTATIONAL SCIENCE, 2023, 72
  • [40] A note on power output prediction for photovoltaic power generation using deep learning
    Maeda Y.
    IEEJ Transactions on Power and Energy, 2019, 139 (12) : 783 - 784