Abstract
In CRYPTO 2019, Gohr first introduced a pioneering attempt, and successfully applied neural differential distinguisher (\(\mathcal {NDD}\)) based differential cryptanalysis against Speck32/64, achieving higher accuracy than the pure differential distinguishers and reducing the data complexity of chosen plaintexts. Inspired by Gohr’s work, we attempt to use neural network to analyze the cipher \(\texttt {TinyJAMBU-128}\) which is one of ten NIST’s lightweight cryptography standardization process finalists. Based on MLP, we construct a Neural Single Differential Distinguisher (\(\mathcal {NSDD}\)), on which we get an accuracy of \(99.58\%\) with 32-bit associated data(AD). The experiment results show that \(\texttt {TinyJAMBU-128}\) with 32-bit AD is vulnerable to differential attacks. In this article, we also explore \(\texttt {GIFT-64}\). Based on Long Short-Term Memory (LSTM), we construct \(\mathcal {NSDD}\) and Neural Polytopic Differential Distinguisher(\(\mathcal {NPDD}\)). For 4-,5-,6-round \(\texttt {GIFT-64}\), we get an accuracy of \(99.73\%, 85.08\%\), \(57.54\%\) with \(\mathcal {NPDD}\) and obtain an accuracy of \(97.97\%, 75.11\%, 57.25\%\) with \(\mathcal {NSDD}\) respectively. Compared with Yadav’s research in which MLP is used, we get a higher acccuracy with only \(\frac{1}{4}\) train dataset. It shows that our model is better than Yadav’s.
’This work was supported in part by the National Key Research and Development Program of China under Grant 2022YFB2701602, the Xiangtan University scientific research project under Grant 15XZX32, the National Natural Science Foundation of China under Grant No. 62172350, the Hunan Province Department of Education under Grant 21B0120, the Natural Science Foundation of Hunan under Grant No. 2021JJ40544. The code is available at https://github.com/ASC8384/Neural-Distinguishers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Banik, S., et al.: Gift-cofb. Cryptology ePrint Archive (2020)
Banik, S., Pandey, S.K., Peyrin, T., Sasaki, Y., Sim, S.M., Todo, Y.: Towards reaching the limit of lightweight encryption (Full version), p. 50
Biham, E., Shamir, A.: Differential cryptanalysis of des-like cryptosystems. J. Cryptol. 4(1), 3–72 (1991)
Chen, Y., Shen, Y., Yu, H., Yuan, S.: Neural aided statistical attack for cryptanalysis. Cryptology ePrint Archive (2020)
Chen, Y., Shen, Y., Yu, H., Yuan, S.: A new neural distinguisher considering features derived from multiple ciphertext pairs. Comput. J. bxac019 (2022). https://doi.org/10.1093/comjnl/bxac019
Gohr, A.: Improving attacks on round-reduced speck32/64 using deep learning. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019. LNCS, vol. 11693, pp. 150–179. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-26951-7_6
Hesamifard, E., Takabi, H., Ghasemi, M.: Cryptodl: deep neural networks over encrypted data. arXiv preprint arXiv:1711.05189 (2017)
Hou, Z., Ren, J., Chen, S.: Cryptanalysis of round-reduced simon32 based on deep learning. Cryptology ePrint Archive (2021)
Jain, A., Kohli, V., Mishra, G.: Deep learning based Differential Distinguisher for lightweight cipher PRESENT, p. 7 (2020)
Lee, J.H., Heo, M., Kim, K.R., Kim, C.S.: Single-image depth estimation based on fourier domain analysis. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 330–339 (2018)
Lu, J., Liu, G., Liu, Y., Sun, B., Li, C., Liu, L.: Improved neural distinguishers with (related-key) differentials: applications in SIMON and SIMECK (2022). arXiv:2201.03767
Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48285-7_33
Mishra, G., Gupta, I., Murthy, S.V., Pal, S.K.: Deep learning based cryptanalysis of stream ciphers. Defence Sci. J. 71(4), 499–506 (2021). https://doi.org/10.14429/dsj.71.16209
Rivest, R.L.: Cryptography and machine learning. In: Imai, H., Rivest, R.L., Matsumoto, T. (eds.) ASIACRYPT 1991. LNCS, vol. 739, pp. 427–439. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-57332-1_36
Smith, L.N.: Cyclical learning rates for training neural networks. In: 2017 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 464–472. IEEE (2017)
Sonmez Turan, M., et al.: Status report on the second round of the nist lightweight cryptography standardization process. Tech. Rep. Natl. Inst. Stan. Technol. (2021). https://doi.org/10.6028/NIST.IR.8369
Su, H.-C., Zhu, X.-Y., Ming, D.: Polytopic attack on round-reduced simon32/64 using deep learning. In: Wu, Y., Yung, M. (eds.) Inscrypt 2020. LNCS, vol. 12612, pp. 3–20. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-71852-7_1
Sun, L., Preneel, B., Wang, W., Wang, M.: A greater: strengthening against statistical cryptanalysis. In: Dunkelman, O., Dziembowski, S. (eds.) EUROCRYPT 2022. LNCS, pp. 115–144. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-07082-2_5
Wu, H., Huang, T.: TinyJAMBU: A Family of Lightweight Authenticated Encryption Algorithms (Version 2), p. 40
Wu, H., Huang, T.: Jambu lightweight authenticated encryption mode and AES-JAMBU. CAESAR Competition Proposal (2014)
Tiessen, T.: Polytopic cryptanalysis. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9665, pp. 214–239. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49890-3_9
Yadav, T., Kumar, M.: Differential-ML distinguisher: machine learning based generic extension for differential cryptanalysis. In: Longa, P., Ràfols, C. (eds.) LATINCRYPT 2021. LNCS, vol. 12912, pp. 191–212. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-88238-9_10
Baksi, A., Breier, J., Chen, Y., Dong, X.: Machine learning assisted differential distinguishers for lightweight ciphers, p. 16 (2022)
Bellini, E., Rossi, M.: Performance comparison between deep learning-based and conventional cryptographic distinguishers. In: Arai, K. (ed.) Intelligent Computing. LNNS, vol. 285, pp. 681–701. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-80129-8_48
Cagli, E., Dumas, C., Prouff, E.: Convolutional neural networks with data augmentation against jitter-based countermeasures. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 45–68. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66787-4_3
Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. In: Carlet, C., Hasan, M.A., Saraswat, V. (eds.) SPACE 2016. LNCS, vol. 10076, pp. 3–26. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-49445-6_1
Hou, Z., Ren, J., Chen, S.: Improve neural distinguisher for cryptanalysis, p. 29 (2021)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sun, T., Shen, D., Long, S., Deng, Q., Wang, S. (2023). Neural Distinguishers on \(\texttt {TinyJAMBU-128}\) and \(\texttt {GIFT-64}\). In: Tanveer, M., Agarwal, S., Ozawa, S., Ekbal, A., Jatowt, A. (eds) Neural Information Processing. ICONIP 2022. Communications in Computer and Information Science, vol 1792. Springer, Singapore. https://doi.org/10.1007/978-981-99-1642-9_36
Download citation
DOI: https://doi.org/10.1007/978-981-99-1642-9_36
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-1641-2
Online ISBN: 978-981-99-1642-9
eBook Packages: Computer ScienceComputer Science (R0)