Abstract
In CRYPTO 2019, Gohr uses the residual network technology of artificial intelligence to build a differential distinguisher, and attacks the reduced-round Speck32/64. We tried this method to recover the keys for ten-round Simon32/64. In this paper, we have three innovations. First, we construct polytope neural network distinguisher. On eight-round Simon32/64, polytope neural network distinguisher could increase the success rate of three neural network distinguishers with 0.76 success rate to 0.92. Second, we propose an attack on Simon32/64 based on the combination of the probability of differential path and polytope neural network distinguisher. This method can only increase the computational complexity of the chosen data as the number of rounds increases. Nine-round polytope neural network distinguisher is used to filter out data, whether it is what we want. Eight-round neural distinguisher is used to recover the final round key. The computational complexity of key recovery on the final key of eleven-round Simon32/64 is \(2^{33.4}\). Third, we propose an attack called Bayesian Key Research with Error. With this attack, the computational complexity of key recovery on the final key of eleven-round Simon32/64 is \(2^{30.9}\).
In our paper, the main idea is combining polytope differences with neural networks. By constructing polytope differential neural network distinguisher, we make a key recovery attack. In order to increase the number of rounds, we first used brute force attack and then proposed Bayesian Key Research with Error. We think this idea can be applied to many cryptographic algorithms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Hospodar, G., Gierlichs, B., Mulder, D.E., Verbauwhede, I., Vandewalle, J.: Machine learning in side-channel analysis: a first study. J. Cryptogr. Eng. 1(4), 293 (2011)
Alani, M.M.: Neuro-cryptanalysis of DES and triple-DES. In: Huang, T., Zeng, Z., Li, C., Leung, C.S. (eds.) ICONIP 2012. LNCS, vol. 7667, pp. 637–646. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34500-5_75
Gohr, A.: Improving attacks on round-reduced Speck32/64 using deep learning. In: International Cryptology Conference, pp. 150–179 (2019)
Beaulieu, R., Shors, D., Smith, J., et al.: The SIMON and SPECK Families of Lightweight Block Ciphers. IACR Cryptology ePrint Archive (2013)
Abed, F., List, E., Lucks, S., et al.: Differential cryptanalysis of round-reduced Simon and speck. In: Fast Software Encryption, pp. 525–545 (2014)
Qiao, K., Hu, L., Sun, S., et al.: Differential analysis on Simeck and SIMON with dynamic key-guessing techniques. In: International Conference on Information Systems Security, pp. 64–85 (2016)
Lecun, Y., Bengio, Y., Hinton, G.E., et al.: Deep learning. Nature 521(7553), 436–444 (2015)
Howard, A., Zhu, M., Chen, B., et al.: MobileNets: efficient convolutional neural networks for mobile vision applications. Arxiv: Computer Vision and Pattern Recognition (2017)
Zhang, X., Zhou, X., Lin, M., et al.: ShuffleNet: an extremely efficient convolutional neural network for mobile devices. In: Computer Vision and Pattern Recognition, pp. 6848–6856 (2018)
He, K., Zhang, X., Ren, S., et al.: Deep residual learning for image recognition. In: Computer Vision and Pattern Recognition, pp. 770–778 (2016)
Pelikan, M., Goldberg, D.E., Cantupaz, E., et al.: BOA: the Bayesian optimization algorithm. In: Genetic and Evolutionary Computation Conference, pp. 525–532 (1999)
Lawler, B.: Computational complexity: a conceptual perspective written by Oded Goldreich, and published by Cambridge University Press, 606 p. (2008). ISBN 978-0-521-88473-0. ACM SIGSOFT Softw. Eng. Notes 35(1), 37–38 (2010)
Wang, N., Wang, X., Jia, K., et al.: Differential attacks on reduced SIMON versions with dynamic key-guessing techniques. Sci. China Ser. F: Inf. Sci. 61(9), 1–3 (2018)
Tiessen, T.: Polytopic cryptanalysis. In: International Cryptology Conference, pp. 214–239 (2016)
Tiessen, T.: From higher-order differentials to polytopic cryptyanalysis. In: Phan, R.C.-W., Yung, M. (eds.) Mycrypt 2016. LNCS, vol. 10311, pp. 544–552. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-61273-7_29
Wang, J., Wu, Q., Fu, C., Zhou, G., Duan, M.: Improved impossible polytopic attacks on round-reduced DES. In: Journal of Physics: Conference Series, vol. 1486 (2020). https://doi.org/10.1088/1742-6596/1486/3/032010
Graves, A., Mohamed, A.R., Hinton, G.: Speech recognition with deep recurrent neural networks. In: IEEE International Conference on Acoustics. IEEE (2013)
Bahdanau, D., Cho, K., Bengio, Y.: Neural machine translation by jointly learning to align and translate. Computer Science (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Su, HC., Zhu, XY., Ming, D. (2021). Polytopic Attack on Round-Reduced Simon32/64 Using Deep Learning. In: Wu, Y., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2020. Lecture Notes in Computer Science(), vol 12612. Springer, Cham. https://doi.org/10.1007/978-3-030-71852-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-71852-7_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-71851-0
Online ISBN: 978-3-030-71852-7
eBook Packages: Computer ScienceComputer Science (R0)