Skip to main content

Machine Learning-Assisted Differential Distinguishers for Lightweight Ciphers

  • Chapter
  • First Online:
Classical and Physical Security of Symmetric Key Cryptographic Algorithms

Part of the book series: Computer Architecture and Design Methodologies ((CADM))

Abstract

At CRYPTO’19, Gohr first introduces the deep learning-based cryptanalysis on round-reduced SPECK. Using a deep residual network, Gohr trains several neural network-based distinguishers on 8-round SPECK -32/64. The analysis follows an “all-in-one” differential cryptanalysis approach, which considers all the output differences effect under the same input difference. Usually, the all-in-one differential cryptanalysis is more effective compared to the one using only one single differential trail. However, when the cipher is non-Markov or its block size is large, it is usually very hard to fully compute. Inspired by Gohr’s work, we try to simulate the all-in-one differentials for non-Markov ciphers through machine learning. Our idea here is to reduce a distinguishing problem to a classification problem so that it can be efficiently managed by machine learning. As a proof of concept, we show several distinguishers for four high-profile ciphers, each of which works with trivial complexity. In particular, we show differential distinguishers for 8-round GIMLI-HASH, GIMLI-CIPHER and GIMLI-PERMUTATION; 3-round ASCON-PERMUTATION; 10-round KNOT-256 permutation and 12-round KNOT-512 permutation; and 4-round CHASKEY- PERMUTATION. Finally, we explore more on choosing an efficient machine learning model and observe that only a three-layer neural network can be used. Our analysis shows the attacker is able to reduce the complexity of finding distinguishers by using machine learning techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.tensorflow.org/.

  2. 2.

    https://keras.io/.

  3. 3.

    New functionalities like higher order differential or key recovery can be incorporated too.

  4. 4.

    https://github.com/jedisct1/libhydrogen.

  5. 5.

    We denote the latest version, ASCONv1.2, as ASCON for simplicity.

  6. 6.

    It is possible to get the same functionalities with artificial neural network, but it is computationally expensive compared to a support vector machine.

References

  1. M. Sonka, V. Hlavac, R. Boyle, Image processing, analysis, and machine vision. Cengage Learning (2014)

    Google Scholar 

  2. D. Bahdanau, K. Cho, Y. Bengio, Neural machine translation by jointly learning to align and translate (2014). arXiv:1409.0473

  3. Y. Wu, M. Schuster, Z. Chen, Q.V. Le, M. Norouzi,W. Macherey, M. Krikun,Y. Cao, Q. Gao, K. Macherey, et al. Google’s neural machine translation system: bridging the gap between human and machine translation (2016). arXiv:1609.08144

  4. C. Chen, A. Seff, A. Kornhauser, J. Xiao, Deepdriving: learning affordance for direct perception in autonomous driving, in Proceedings of the IEEE International Conference on Computer Vision (2015), pp. 2722–2730

    Google Scholar 

  5. S. Greydanus, Learning the enigma with recurrent neural networks (2017). arXiv:1708.07576

  6. S. Haykin, Neural Networks and Learning Machines, 3rd (Pearson, 2008)

    Google Scholar 

  7. D.P. Kingma, J. Ba, Adam: a method for stochastic optimization (2014). arXiv:1412.6980

  8. C. Dobraunig, M. Eichlseder, F. Mendel, M. Schläffer, Ascon v1.2. Submission to NIST (2019). https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/spec-doc-rnd2/ascon-spec-round2.pdf

  9. W. Zhang, T. Ding, B. Yang, Z. Bao, Z. Xiang, F. Ji, X. Zhao, KNOT: algorithm specifications and supporting document. Submission to NIST (2019). https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/spec-doc-rnd2/knot-spec-round.pdf

  10. N. Mouha, B. Mennink, A. V. Herrewege, D. Watanabe, B. Preneel, I. Verbauwhede, Chaskey: an efficient MAC algorithm for 32-bit microcontrollers, in Selected Areas in Cryptography - SAC 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers (2014). pp. 306–323. https://doi.org/10.1007/978-3-319-13051-4

  11. N. Mouha, Chaskey: a MAC algorithm for microcontrollers - status update and proposal of chaskey-12 -. IACR Cryptology 1182, 201 (2015)

    Google Scholar 

  12. G. Bertoni, J. Daemen, M. Peeters, G.V. Assche, Sponge function, in Ecrypt Hash Workshop (May 2007) (2007). https://keccak.team/files/CSF-0.1.pdf

  13. Y. Bengio, Gradient-based optimization of hyperparameters. Neural Comput. 12(8), 1889–1900 (2000)

    Article  MathSciNet  Google Scholar 

  14. J. Bergstra Y. Bengio, Random search for hyper-parameter optimization. J. Mach. Learn. Res. 13(Feb), 281–305 (2012)

    Google Scholar 

  15. A.L. Maas, A.Y. Hannun, A.Y. Ng, Rectifier nonlinearities improve neural network acoustic models, in Proceedings of ICML, vol. 30, Issue 1, p. 3 (2013)

    Google Scholar 

  16. H. Maghrebi, T. Portigliatti, E. Prouff, Breaking cryptographic implementations using deep learning techniques, in Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings (2016), pp. 3–26. https://doi.org/10.1007/978-3-319-49445-6

  17. E. Cagli, C. Dumas, E. Prouff, Convolutional neural networks with data augmentation against jitter-based countermeasures - profiling attacks without preprocessing, in Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings (2017), pp. 45–68 https://doi.org/10.1007/978-3-319-66787-4

  18. M. Abadi, D.G. Andersen, Learning to protect communications with adversarial neural cryptography (2016). CoRR, abs/1610.06918. arXiv: 1610.06918

  19. J. Daemen, V. Rijmen, The Design of Rijndael: The Advanced Encryption Standard (AES), 2nd edn. (Springer, Berlin, Heidelberg, 2020)

    Book  Google Scholar 

  20. M.R. Albrecht, G. Leander, An all-in-one approach to differential cryptanalysis for small block ciphers, in Selected Areas in Cryptography, 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers (2012), pp. 1–15. https://doi.org/10.1007/978-3-642-35999-6%5C_1

  21. D.J. Bernstein, S. Kölbl, S. Lucks, P.M.C. Massolino, F. Mendel, K. Nawaz, T. Schneider, P. Schwabe, F. Standaert, Y. Todo, B. Viguier, Gimli, 2019. https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/spec-doc-rnd2/gimli-spec-round2.pdf

  22. A. Baksi, J. Breier, V.A. Dasu, X. Dong, C. Yi, Following-up on machine learning assisted differential distinguishers, in SILC Workshop - Security and Implementation of Lightweight Cryptography (2021). https://www.esat.kuleuven.be/cosic/events/silc2020/wp-content/uploads/sites/4/2020/10/Submission4.pdf

  23. X. Lai, J.L. Massey, S. Murphy, Markov ciphers and differential cryptanalysis, in Advances in Cryptology-EUROCRYPT ’91, ed. by D.W. Davies (Springer, Berlin, Heidelberg, 1991) pp. 17–38. ISBN: 978-3-540-46416-7

    Google Scholar 

  24. S. Banik, S.K. Pandey, T. Peyrin, Y. Sasaki, S.M. Sim, Y. Todo, Gift: a small present. Cryptology ePrint Archive, Report 2017/622 (2017) https://eprint.iacr.org/2017/622

  25. R. Beaulieu, D. Shors, J. Smith, S. Treatman-Clark, B.Weeks, L.Wingers, The simon and speck families of lightweight block ciphers. Cryptology ePrint Archive, Report 2013/404 (2013). https://eprint.iacr.org/2013/404

  26. D.J. Bernstein, S. Kölbl, S. Lucks, P.M.C. Massolino, F. Mendel, K. Nawaz, T. Schneider, P. Schwabe, F. Standaert, Y. Todo, B. Viguier, Gimli : A crossplatform permutation, in Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings (2017), pp. 299–320. https://doi.org/10.1007/978-3-319-66787-4

  27. G. Bertoni, J. Daemen, M. Peeters, G.V. Assche, Duplexing the sponge: single-pass authenticated encryption and other applications, in Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers (2011), pp. 320–337. http://dx.doi.org/10.1007/978-3-642-28496-0_19

  28. E. Biham, A. Shamir, Differential cryptanalysis of des-like cryptosystems, in Advances in Cryptology - CRYPTO ’90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings (1990), pp. 2–21. https://doi.org/10.1007/3-540-38424-3_1

  29. A. Gohr, Improving attacks on round-reduced speck32/64 using deep learning, in Advances in Cryptology - CRYPTO 2019, ed. by A. Boldyreva, D. Micciancio (2019), pp. 150–179 (Springer International Publishing, Cham, 2019). ISBN: 978-3-030-26951-7

    Google Scholar 

  30. N. Mouha, Q. Wang, D. Gu, B. Preneel, Differential and linear cryptanalysis using mixed-integer linear programming, in Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers (2011), pp. 57–76. https://doi.org/10.1007/978-3-642-34704-7%5C_5

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anubhab Baksi .

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Baksi, A. (2022). Machine Learning-Assisted Differential Distinguishers for Lightweight Ciphers. In: Classical and Physical Security of Symmetric Key Cryptographic Algorithms. Computer Architecture and Design Methodologies. Springer, Singapore. https://doi.org/10.1007/978-981-16-6522-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-6522-6_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-6521-9

  • Online ISBN: 978-981-16-6522-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics