Skip to main content

Preimage Attacks Against Lightweight Scheme Xoodyak Based on Deep Learning

  • Conference paper
  • First Online:
Advances in Information and Communication (FICC 2021)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1364))

Included in the following conference series:

Abstract

With the rapid progress in the artificial intelligence field, machine learning algorithms have been utilized to construct cryptographic schemes and conduct cryptanalysis. In this paper, we propose deep learning-based preimage attacks against variants of Xoodyak hash mode which is a lightweight scheme submitted to the NIST lightweight cryptography standardization project. Three attack models whose internal permutations are of reduced rounds are derived from the original Xoodyak hash mode. Deep neural networks (DNNs) for attack models of 1-round underlying permutations are trained so that the messages of given hash values can be predicted correctly with the networks. In valid attacks, the DNNs are of a low loss rate and high accuracy. This work is more of a tentative attempt to examine the effectiveness of deep learning algorithms employed in conventional preimage attacks. In conclusion, it shows that deep learning techniques make little difference in preimage attacks against Xoodyak hash mode. Compared to the full 12-round internal permutation, only 1 round is covered in the deep learning-based attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Refer to [12, 14] for the specifications of Xoodoo permutation.

References

  1. Lightweight Cryptography|CSRC. https://csrc.nist.gov/projects/lightweight-cryptography. Accessed 08 Sep 2020

  2. Abadi, M., Andersen, D.G.: Learning to protect communications with adversarial neural cryptography (2016). arXiv preprint: arXiv:1610.06918

  3. Alallayah, K.M., Alhamami, A.H., AbdElwahed, W., Amin, M.: Applying neural networks for simplified data encryption standard (SDES) cipher system cryptanalysis. Int. Arab J. Inf. Technol. 2, 163–169 (2012)

    Google Scholar 

  4. Alallayah, K.M., Amin, M., Abd El-Wahed, W.F., Alhamami, A.H.: Attack and construction of simulator for some cipher systems using neuro-identifier. Int. Arab J. Inf. Technol. 4, 365–372 (2010)

    Google Scholar 

  5. Alallayah, K.M., El-Wahed, W.F.A., Amin, M., Alhamami, A.H.: Attack of against simplified data encryption standard cipher system using neural networks. J. Comput. Sci. 1, 29 (2010)

    Article  Google Scholar 

  6. Alani, M.M.: Neuro-cryptanalysis of DES. In: World Congress on Internet Security (WorldCIS-2012), pp. 23–27 (2012)

    Google Scholar 

  7. Alani, M.M.: Neuro-cryptanalysis of DES and triple-DES. In: International Conference on Neural Information Processing, pp. 637–646 (2012)

    Google Scholar 

  8. Albassal, A.M.B., Wahdan, A.M.A.: Neural network based cryptanalysis of a feistel type block cipher. In: International Conference on Electrical, Electronic and Computer Engineering 2004 (ICEEC 2004), pp. 231–237 (2004)

    Google Scholar 

  9. Bafghi, A.G., Safabakhsh, R., Sadeghiyan, B.: Finding the differential characteristics of block ciphers with neural networks. Inf. Sci. 15, 3118–3132 (2008)

    Article  Google Scholar 

  10. Baksi, A., Breier, J., Dong, X., Yi, C.: Machine learning assisted differential distinguishers for lightweight ciphers. IACR Cryptol. ePrint Arch. 2020, 571 (2020)

    Google Scholar 

  11. Chandra, B., Paul Varghese, P.: Applications of cascade correlation neural networks for cipher system identification. World Acad. Sci. Eng. Technol. 26, 312–314 (2007)

    Google Scholar 

  12. Daemen, J., Hoffert, S., Van Assche, G., Van Keer, R.: The design of Xoodoo and Xoofff. IACR Trans. Symmetric Cryptol. 4, 1–38 (2018)

    Article  Google Scholar 

  13. Daemen, J., Hoffert, S., Peeters, M., Van Assche, G., Van Keer, R.: Xoodyak, a lightweight cryptographic scheme. In: Submission to the NIST Lightweight Cryptography Competition (2019). https://csrc.nist.gov/CSRC/media/Projects/Lightweight-Cryptography/documents/round-1/spec-doc/Xoodyak-spec.pdf

  14. Daemen, J., Hoffert, S., Van Assche, G., Van Keer, R.: Xoodoo cookbook. IACR Cryptol. ePrint Arch. 767 (2018)

    Google Scholar 

  15. Dhanda, S.S., Singh, B., Jindal, P.: Lightweight cryptography: a solution to secure IOT. Wirel. Personal Commun. 112, 1–34 (2020)

    Article  Google Scholar 

  16. Dworkin, M.J.: SHA-3 standard: permutation-based hash and extendable-output functions. Technical report (2015)

    Google Scholar 

  17. Godhavari, T., Alamelu, N.R., Soundararajan, R.: Cryptography using neural network. In: 2005 Annual IEEE India Conference-Indicon, pp. 258–261 (2005)

    Google Scholar 

  18. Gohr, A.: Improving attacks on round-reduced speck32/64 using deep learning. In: Annual International Cryptology Conference, pp. 150–179 (2019)

    Google Scholar 

  19. Hu, X., Zhao, Y.: Research on plaintext restoration of AES based on neural network. Security and Communication Networks (2018)

    Google Scholar 

  20. Jayachandiran, K., Kaminsky, A.: A machine learning approach for cryptanalysis. RIT Computer Science (2016)

    Google Scholar 

  21. Kamal, P., Ahuja, S.: Academic performance prediction using data mining techniques: identification of influential factors effecting the academic performance in undergrad professional course. In: Yadav, N., Yadav, A., Bansal, J., Deep, K., Kim, J. (eds.) Harmony Search and Nature Inspired Optimization Algorithms. Advances in Intelligent Systems and Computing, vol. 741, pp. 835–843. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-0761-4_79

    Chapter  Google Scholar 

  22. Kanter, I., Kinzel, W., Kanter, E.: Secure exchange of information by synchronization of neural networks. EPL (Europhys. Lett.) 1, 141 (2002)

    Article  Google Scholar 

  23. Li, L.-H., Lin, L.-C., Hwang, M.-S.: A remote password authentication scheme for multiserver architecture using neural networks. IEEE Trans. Neural Netw. 6, 1498–1504 (2001)

    Google Scholar 

  24. Rivest, R.L.: Cryptography and machine learning. In: International Conference on the Theory and Application of Cryptology, pp. 427–439 (1991)

    Google Scholar 

  25. Sethi, P., Sarangi, S.R.: Internet of things: architectures, protocols, and applications. J. Elect. Comput. Eng. 2017, 1–26 (2017)

    Article  Google Scholar 

  26. So, J.: Deep learning-based cryptanalysis of lightweight block ciphers. Secur. Commun. Netw. 2020, 1–12 (2020)

    Article  Google Scholar 

  27. Zhou, H., Li, Z., Dong, X., Jia, K., Meier, W.: Practical key-recovery attacks on round-reduced Ketje Jr., Xoodoo-AE and Xoodyak. Comput. J. 23, 1231–1246 (2019)

    MathSciNet  Google Scholar 

Download references

Acknowledgments

The authors would like to thank the anonymous referees for their helpful comments. The authors are supported by the National Key Research and Development Program of China under Grant 2017YFB0802704 and the National Natural Science Foundation of China under Grant 61972249.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weidong Qiu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, G., Lu, J., Li, H., Tang, P., Qiu, W. (2021). Preimage Attacks Against Lightweight Scheme Xoodyak Based on Deep Learning. In: Arai, K. (eds) Advances in Information and Communication. FICC 2021. Advances in Intelligent Systems and Computing, vol 1364. Springer, Cham. https://doi.org/10.1007/978-3-030-73103-8_45

Download citation

Publish with us

Policies and ethics