DESIGN OF SYMMETRIC CRYPTOGRAPHIC DIFFERENTIAL DISTINGUISHER BASED ON DEEP LEARNING

Authors

DOI:

https://doi.org/10.28925/2663-4023.2024.26.674

Keywords:

deep learning, cryptanalysis, Gore's model, symmetric cryptographic differential discriminator, Speck32/64.

Abstract

Research in the field of cryptanalysis demonstrates that differential discriminators based on neural networks significantly outperform traditional methods in identifying weaknesses in simple encryption algorithms. This is due to their ability to detect complex patterns in data that may go unnoticed by classical approaches. However, despite their high performance, there are limitations in terms of the accuracy of the discrimination and the maximum number of rounds that can be compromised for certain ciphers. The purpose of this study is to overcome these shortcomings by optimizing the architecture of the neural network (NN) and the structure of the input data, according to the Gohr model. As part of this work, several key components of the differential discriminator were improved: the convolutional module, the residual module, and the prediction module. The optimization of these components allowed to significantly increase the efficiency in recognizing differential patterns in ciphertexts. In addition, special attention was paid to optimizing the structure of the input data, which made it possible to more accurately identify the characteristics of the ciphertext and information about the encryption structure. The results of the study, conducted on the example of cryptanalysis of the Speck32/64 cipher, confirm the improvements achieved: the accuracy of the differential distinguisher has increased by 5-7 rounds, and the recognition capability has been extended to 8 cipher rounds. These achievements demonstrate the high efficiency of the proposed approach, which has significant potential for further research in the field of cryptanalysis. Due to the importance of information system security, the results of this study can significantly affect the development of new cryptanalysis methods and the improvement of encryption algorithms, which, in turn, can lead to increased data protection reliability in the modern digital environment. The results of the study, conducted on the example of cryptanalysis of the Speck32/64 cipher, confirm the improvements achieved: the accuracy of the differential distinguisher has increased by 5-7 rounds, and the recognition capability has been extended to 8 cipher rounds. These achievements demonstrate the high efficiency of the proposed approach, which has significant potential for further research in the field of cryptanalysis. Due to the importance of information system security, the results of this study can significantly affect the development of new cryptanalysis methods and the improvement of encryption algorithms, which, in turn, can lead to an increase in the reliability of data protection in the modern digital environment.

Downloads

Download data is not yet available.

References

Gohr, A. (2019). Improving attacks on round-reduced Speck32/64 using deep learning. In: Advances in Cryptology – CRYPTO 2019. LNCS, vol. 11693, 150–179. https://doi.org/10.1007/978-3-030-26951-7_6

Baksi, A., et al. (2020). Machine Learning Assisted Differential Distinguishers for Lightweight Ciphers (Extended Version). In: Classical and Physical Security of Symmetric Key Cryptographic Algorithms. Computer Architecture and Design Methodologies, 141–162. https://doi.org/10.1007/978-981-16-6522-6_6

Jain, A., Kohli, V., & Mishra, G. (2020). Deep learning based differential distinguisher for lightweight cipher PRESENT. Cryptology ePrint Archive.

Wang, M. (2008). Differential cryptanalysis of reduced-round PRESENT. In: Cryptology – AFRICACRYPT 2008. AFRICACRYPT 2008. Lecture Notes in Computer Science, vol. 5023, 40–49. https://doi.org/10.1007/978-3-540-68164-9_4

Bellini, E., & Rossi, M. (2021). Performance comparison between deep learning-based and conventional cryptographic distinguishers, Intelligent Computing, LNNS, vol. 285, 681–701. https://doi.org/10.1007/978-3-030-80129-8_48

Lyu, L., Tu, Y., & Zhang, Y. (2022). Improving the Deep-Learning-Based Differential Distinguisher and Applications to Simeck. In: IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD), 465–470. https://doi.org/10.1007/978-3-030-80129-8_48

Su, H. C., Zhu, X. Y., & Ming, D. (2021). Polytopic attack on round-reduced simon32/64 using deep learning. International Conference on Information Security and Cryptology. LNCS, vol. 12612, 3–20. https://doi.org/10.1007/978-3-030-71852-7_1

Benamira, A., Gerault, D., Peyrin, T., & Tan, Q. Q. (2021). A Deeper Look at Machine Learning-Based Cryptanalysis. Advances in Cryptology – EUROCRYPT 2021. EUROCRYPT 2021, LNCS, vol. 12696, 805–835. https://doi.org/10.1007/978-3-030-77870-5_28

Sun, L., Gerault, D., Benamira, A., & Peyrin, T. (2020). Neurogift: Using a machine learning based sat solver for cryptanalysis. In: Cyber Security Cryptography and Machine Learning: Fourth International Symposium, CSCML 2020, LNCS, vol. 12161, 62–84. https://doi.org/10.1007/978-3-030-49785-9_5

Hou, Z., Ren, J., & Chen, S. (2021). Cryptanalysis of round-reduced SIMON32 based on deeplearning. Cryptology ePrint Archive.

Chen, Y., Shen, Y., Yu, H., & Yuan, S. (2023). A New Neural Distinguisher Considering Features Derived from Multiple Ciphertext Pairs. The Computer Journal, 66(6), 1419–1433. https://doi.org/10.1093/comjnl/bxac019

Rajan, R., et al. (2022). Deep Learning-Based Differential Distinguisherfor Lightweight Cipher GIFT-COFB. Machine Intelligence and Smart Systems: Proceedings of MISS 2021, 397–406. https://doi.org/10.1007/978-981-16-9650-3_31

Beaulieu, R., et al. (2015). The SIMON and SPECK families of lightweight block ciphers. DAC’15: Proceedings of the 52nd Annual Design Automation Conference, 175, 1–6. https://doi.org/10.1145/2744769.2747946

Biham, E., Shamir, A. (1991). Differential cryptanalysis of DES-like cryptosystems. Journal of CRYPTOLOGY, 4(1), 3–72.

Sarker, I. H. (2021). Deep Learning: A Comprehensive Overview on Techniques, Taxonomy, Applications and Research Directions. SN Computer Science, 2 (6), 1–20. https://doi.org/10.1007/s42979-021-00815-1

He, K., et al. (2016). Deep residual learning for image recognition. IEEE Conference on Computer Vision and Pattern Recognition, 770–778. https://doi.org/10.1109/CVPR.2016.90

Gohr, A. (2019). Improving attacks on round-reduced Speck32/64 using deep learning. CRYPTO 2019, LNCS, vol. 11693, 150–179. https://doi.org/10.1007/978-3-030-26951-7_6

Hu, J., Shen, L., & Sun, G. (2018). Squeeze-and-Excitation Networks. The Conference on Computer Vision and Pattern Recognition, IEEE, 7132–7141. https://doi.org/10.1109/CVPR.2018.00745

Shalev-Shwartz, S., & Ben-David, S. (2014). Understanding machine learning: From theory to algorithms. Cambridge university press.

Chen, Y., & Yu, H. (2021). A New Neural Distinguisher Model Considering Derived Features from Multiple Ciphertext Pairs. The Computer Journal.

Hou, Z., Ren, J., & Chen, S. (2021). Improve neural distinguisher for cryptanalysis. Cryptology ePrint Archive.

Hulak, H. M., Zhiltsov, O. B., Kyrychok, R. V., Korshun, N. V., & Skladannyi, P. M. (2024). Information and cyber security of the enterprise. Textbook. Lviv: Publisher Marchenko T. V.

Downloads


Abstract views: 3

Published

2024-12-19

How to Cite

Jiang, X., Lakhno, V., Sahun, A., & Mamchenko, S. (2024). DESIGN OF SYMMETRIC CRYPTOGRAPHIC DIFFERENTIAL DISTINGUISHER BASED ON DEEP LEARNING. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 2(26), 123–139. https://doi.org/10.28925/2663-4023.2024.26.674

Most read articles by the same author(s)

1 2 > >>