Abstract
With the rapid progress in the artificial intelligence field, machine learning algorithms have been utilized to construct cryptographic schemes and conduct cryptanalysis. In this paper, we propose deep learning-based preimage attacks against variants of Xoodyak hash mode which is a lightweight scheme submitted to the NIST lightweight cryptography standardization project. Three attack models whose internal permutations are of reduced rounds are derived from the original Xoodyak hash mode. Deep neural networks (DNNs) for attack models of 1-round underlying permutations are trained so that the messages of given hash values can be predicted correctly with the networks. In valid attacks, the DNNs are of a low loss rate and high accuracy. This work is more of a tentative attempt to examine the effectiveness of deep learning algorithms employed in conventional preimage attacks. In conclusion, it shows that deep learning techniques make little difference in preimage attacks against Xoodyak hash mode. Compared to the full 12-round internal permutation, only 1 round is covered in the deep learning-based attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lightweight Cryptography|CSRC. https://csrc.nist.gov/projects/lightweight-cryptography. Accessed 08 Sep 2020
Abadi, M., Andersen, D.G.: Learning to protect communications with adversarial neural cryptography (2016). arXiv preprint: arXiv:1610.06918
Alallayah, K.M., Alhamami, A.H., AbdElwahed, W., Amin, M.: Applying neural networks for simplified data encryption standard (SDES) cipher system cryptanalysis. Int. Arab J. Inf. Technol. 2, 163–169 (2012)
Alallayah, K.M., Amin, M., Abd El-Wahed, W.F., Alhamami, A.H.: Attack and construction of simulator for some cipher systems using neuro-identifier. Int. Arab J. Inf. Technol. 4, 365–372 (2010)
Alallayah, K.M., El-Wahed, W.F.A., Amin, M., Alhamami, A.H.: Attack of against simplified data encryption standard cipher system using neural networks. J. Comput. Sci. 1, 29 (2010)
Alani, M.M.: Neuro-cryptanalysis of DES. In: World Congress on Internet Security (WorldCIS-2012), pp. 23–27 (2012)
Alani, M.M.: Neuro-cryptanalysis of DES and triple-DES. In: International Conference on Neural Information Processing, pp. 637–646 (2012)
Albassal, A.M.B., Wahdan, A.M.A.: Neural network based cryptanalysis of a feistel type block cipher. In: International Conference on Electrical, Electronic and Computer Engineering 2004 (ICEEC 2004), pp. 231–237 (2004)
Bafghi, A.G., Safabakhsh, R., Sadeghiyan, B.: Finding the differential characteristics of block ciphers with neural networks. Inf. Sci. 15, 3118–3132 (2008)
Baksi, A., Breier, J., Dong, X., Yi, C.: Machine learning assisted differential distinguishers for lightweight ciphers. IACR Cryptol. ePrint Arch. 2020, 571 (2020)
Chandra, B., Paul Varghese, P.: Applications of cascade correlation neural networks for cipher system identification. World Acad. Sci. Eng. Technol. 26, 312–314 (2007)
Daemen, J., Hoffert, S., Van Assche, G., Van Keer, R.: The design of Xoodoo and Xoofff. IACR Trans. Symmetric Cryptol. 4, 1–38 (2018)
Daemen, J., Hoffert, S., Peeters, M., Van Assche, G., Van Keer, R.: Xoodyak, a lightweight cryptographic scheme. In: Submission to the NIST Lightweight Cryptography Competition (2019). https://csrc.nist.gov/CSRC/media/Projects/Lightweight-Cryptography/documents/round-1/spec-doc/Xoodyak-spec.pdf
Daemen, J., Hoffert, S., Van Assche, G., Van Keer, R.: Xoodoo cookbook. IACR Cryptol. ePrint Arch. 767 (2018)
Dhanda, S.S., Singh, B., Jindal, P.: Lightweight cryptography: a solution to secure IOT. Wirel. Personal Commun. 112, 1–34 (2020)
Dworkin, M.J.: SHA-3 standard: permutation-based hash and extendable-output functions. Technical report (2015)
Godhavari, T., Alamelu, N.R., Soundararajan, R.: Cryptography using neural network. In: 2005 Annual IEEE India Conference-Indicon, pp. 258–261 (2005)
Gohr, A.: Improving attacks on round-reduced speck32/64 using deep learning. In: Annual International Cryptology Conference, pp. 150–179 (2019)
Hu, X., Zhao, Y.: Research on plaintext restoration of AES based on neural network. Security and Communication Networks (2018)
Jayachandiran, K., Kaminsky, A.: A machine learning approach for cryptanalysis. RIT Computer Science (2016)
Kamal, P., Ahuja, S.: Academic performance prediction using data mining techniques: identification of influential factors effecting the academic performance in undergrad professional course. In: Yadav, N., Yadav, A., Bansal, J., Deep, K., Kim, J. (eds.) Harmony Search and Nature Inspired Optimization Algorithms. Advances in Intelligent Systems and Computing, vol. 741, pp. 835–843. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-0761-4_79
Kanter, I., Kinzel, W., Kanter, E.: Secure exchange of information by synchronization of neural networks. EPL (Europhys. Lett.) 1, 141 (2002)
Li, L.-H., Lin, L.-C., Hwang, M.-S.: A remote password authentication scheme for multiserver architecture using neural networks. IEEE Trans. Neural Netw. 6, 1498–1504 (2001)
Rivest, R.L.: Cryptography and machine learning. In: International Conference on the Theory and Application of Cryptology, pp. 427–439 (1991)
Sethi, P., Sarangi, S.R.: Internet of things: architectures, protocols, and applications. J. Elect. Comput. Eng. 2017, 1–26 (2017)
So, J.: Deep learning-based cryptanalysis of lightweight block ciphers. Secur. Commun. Netw. 2020, 1–12 (2020)
Zhou, H., Li, Z., Dong, X., Jia, K., Meier, W.: Practical key-recovery attacks on round-reduced Ketje Jr., Xoodoo-AE and Xoodyak. Comput. J. 23, 1231–1246 (2019)
Acknowledgments
The authors would like to thank the anonymous referees for their helpful comments. The authors are supported by the National Key Research and Development Program of China under Grant 2017YFB0802704 and the National Natural Science Foundation of China under Grant 61972249.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Liu, G., Lu, J., Li, H., Tang, P., Qiu, W. (2021). Preimage Attacks Against Lightweight Scheme Xoodyak Based on Deep Learning. In: Arai, K. (eds) Advances in Information and Communication. FICC 2021. Advances in Intelligent Systems and Computing, vol 1364. Springer, Cham. https://doi.org/10.1007/978-3-030-73103-8_45
Download citation
DOI: https://doi.org/10.1007/978-3-030-73103-8_45
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-73102-1
Online ISBN: 978-3-030-73103-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)