Skip to main content

Polytopic Attack on Round-Reduced Simon32/64 Using Deep Learning

  • Conference paper
  • First Online:
Information Security and Cryptology (Inscrypt 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12612))

Included in the following conference series:

  • 1369 Accesses

Abstract

In CRYPTO 2019, Gohr uses the residual network technology of artificial intelligence to build a differential distinguisher, and attacks the reduced-round Speck32/64. We tried this method to recover the keys for ten-round Simon32/64. In this paper, we have three innovations. First, we construct polytope neural network distinguisher. On eight-round Simon32/64, polytope neural network distinguisher could increase the success rate of three neural network distinguishers with 0.76 success rate to 0.92. Second, we propose an attack on Simon32/64 based on the combination of the probability of differential path and polytope neural network distinguisher. This method can only increase the computational complexity of the chosen data as the number of rounds increases. Nine-round polytope neural network distinguisher is used to filter out data, whether it is what we want. Eight-round neural distinguisher is used to recover the final round key. The computational complexity of key recovery on the final key of eleven-round Simon32/64 is \(2^{33.4}\). Third, we propose an attack called Bayesian Key Research with Error. With this attack, the computational complexity of key recovery on the final key of eleven-round Simon32/64 is \(2^{30.9}\).

In our paper, the main idea is combining polytope differences with neural networks. By constructing polytope differential neural network distinguisher, we make a key recovery attack. In order to increase the number of rounds, we first used brute force attack and then proposed Bayesian Key Research with Error. We think this idea can be applied to many cryptographic algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Hospodar, G., Gierlichs, B., Mulder, D.E., Verbauwhede, I., Vandewalle, J.: Machine learning in side-channel analysis: a first study. J. Cryptogr. Eng. 1(4), 293 (2011)

    Article  Google Scholar 

  2. Alani, M.M.: Neuro-cryptanalysis of DES and triple-DES. In: Huang, T., Zeng, Z., Li, C., Leung, C.S. (eds.) ICONIP 2012. LNCS, vol. 7667, pp. 637–646. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34500-5_75

    Chapter  Google Scholar 

  3. Gohr, A.: Improving attacks on round-reduced Speck32/64 using deep learning. In: International Cryptology Conference, pp. 150–179 (2019)

    Google Scholar 

  4. Beaulieu, R., Shors, D., Smith, J., et al.: The SIMON and SPECK Families of Lightweight Block Ciphers. IACR Cryptology ePrint Archive (2013)

    Google Scholar 

  5. Abed, F., List, E., Lucks, S., et al.: Differential cryptanalysis of round-reduced Simon and speck. In: Fast Software Encryption, pp. 525–545 (2014)

    Google Scholar 

  6. Qiao, K., Hu, L., Sun, S., et al.: Differential analysis on Simeck and SIMON with dynamic key-guessing techniques. In: International Conference on Information Systems Security, pp. 64–85 (2016)

    Google Scholar 

  7. Lecun, Y., Bengio, Y., Hinton, G.E., et al.: Deep learning. Nature 521(7553), 436–444 (2015)

    Article  Google Scholar 

  8. Howard, A., Zhu, M., Chen, B., et al.: MobileNets: efficient convolutional neural networks for mobile vision applications. Arxiv: Computer Vision and Pattern Recognition (2017)

    Google Scholar 

  9. Zhang, X., Zhou, X., Lin, M., et al.: ShuffleNet: an extremely efficient convolutional neural network for mobile devices. In: Computer Vision and Pattern Recognition, pp. 6848–6856 (2018)

    Google Scholar 

  10. He, K., Zhang, X., Ren, S., et al.: Deep residual learning for image recognition. In: Computer Vision and Pattern Recognition, pp. 770–778 (2016)

    Google Scholar 

  11. Pelikan, M., Goldberg, D.E., Cantupaz, E., et al.: BOA: the Bayesian optimization algorithm. In: Genetic and Evolutionary Computation Conference, pp. 525–532 (1999)

    Google Scholar 

  12. Lawler, B.: Computational complexity: a conceptual perspective written by Oded Goldreich, and published by Cambridge University Press, 606 p. (2008). ISBN 978-0-521-88473-0. ACM SIGSOFT Softw. Eng. Notes 35(1), 37–38 (2010)

    Google Scholar 

  13. Wang, N., Wang, X., Jia, K., et al.: Differential attacks on reduced SIMON versions with dynamic key-guessing techniques. Sci. China Ser. F: Inf. Sci. 61(9), 1–3 (2018)

    MathSciNet  Google Scholar 

  14. Tiessen, T.: Polytopic cryptanalysis. In: International Cryptology Conference, pp. 214–239 (2016)

    Google Scholar 

  15. Tiessen, T.: From higher-order differentials to polytopic cryptyanalysis. In: Phan, R.C.-W., Yung, M. (eds.) Mycrypt 2016. LNCS, vol. 10311, pp. 544–552. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-61273-7_29

    Chapter  Google Scholar 

  16. Wang, J., Wu, Q., Fu, C., Zhou, G., Duan, M.: Improved impossible polytopic attacks on round-reduced DES. In: Journal of Physics: Conference Series, vol. 1486 (2020). https://doi.org/10.1088/1742-6596/1486/3/032010

  17. Graves, A., Mohamed, A.R., Hinton, G.: Speech recognition with deep recurrent neural networks. In: IEEE International Conference on Acoustics. IEEE (2013)

    Google Scholar 

  18. Bahdanau, D., Cho, K., Bengio, Y.: Neural machine translation by jointly learning to align and translate. Computer Science (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuan-Yong Zhu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Su, HC., Zhu, XY., Ming, D. (2021). Polytopic Attack on Round-Reduced Simon32/64 Using Deep Learning. In: Wu, Y., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2020. Lecture Notes in Computer Science(), vol 12612. Springer, Cham. https://doi.org/10.1007/978-3-030-71852-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-71852-7_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-71851-0

  • Online ISBN: 978-3-030-71852-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics