Abstract
At CRYPTO’19, Gohr first introduces the deep learning-based cryptanalysis on round-reduced SPECK. Using a deep residual network, Gohr trains several neural network-based distinguishers on 8-round SPECK -32/64. The analysis follows an “all-in-one” differential cryptanalysis approach, which considers all the output differences effect under the same input difference. Usually, the all-in-one differential cryptanalysis is more effective compared to the one using only one single differential trail. However, when the cipher is non-Markov or its block size is large, it is usually very hard to fully compute. Inspired by Gohr’s work, we try to simulate the all-in-one differentials for non-Markov ciphers through machine learning. Our idea here is to reduce a distinguishing problem to a classification problem so that it can be efficiently managed by machine learning. As a proof of concept, we show several distinguishers for four high-profile ciphers, each of which works with trivial complexity. In particular, we show differential distinguishers for 8-round GIMLI-HASH, GIMLI-CIPHER and GIMLI-PERMUTATION; 3-round ASCON-PERMUTATION; 10-round KNOT-256 permutation and 12-round KNOT-512 permutation; and 4-round CHASKEY- PERMUTATION. Finally, we explore more on choosing an efficient machine learning model and observe that only a three-layer neural network can be used. Our analysis shows the attacker is able to reduce the complexity of finding distinguishers by using machine learning techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
New functionalities like higher order differential or key recovery can be incorporated too.
- 4.
- 5.
We denote the latest version, ASCONv1.2, as ASCON for simplicity.
- 6.
It is possible to get the same functionalities with artificial neural network, but it is computationally expensive compared to a support vector machine.
References
M. Sonka, V. Hlavac, R. Boyle, Image processing, analysis, and machine vision. Cengage Learning (2014)
D. Bahdanau, K. Cho, Y. Bengio, Neural machine translation by jointly learning to align and translate (2014). arXiv:1409.0473
Y. Wu, M. Schuster, Z. Chen, Q.V. Le, M. Norouzi,W. Macherey, M. Krikun,Y. Cao, Q. Gao, K. Macherey, et al. Google’s neural machine translation system: bridging the gap between human and machine translation (2016). arXiv:1609.08144
C. Chen, A. Seff, A. Kornhauser, J. Xiao, Deepdriving: learning affordance for direct perception in autonomous driving, in Proceedings of the IEEE International Conference on Computer Vision (2015), pp. 2722–2730
S. Greydanus, Learning the enigma with recurrent neural networks (2017). arXiv:1708.07576
S. Haykin, Neural Networks and Learning Machines, 3rd (Pearson, 2008)
D.P. Kingma, J. Ba, Adam: a method for stochastic optimization (2014). arXiv:1412.6980
C. Dobraunig, M. Eichlseder, F. Mendel, M. Schläffer, Ascon v1.2. Submission to NIST (2019). https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/spec-doc-rnd2/ascon-spec-round2.pdf
W. Zhang, T. Ding, B. Yang, Z. Bao, Z. Xiang, F. Ji, X. Zhao, KNOT: algorithm specifications and supporting document. Submission to NIST (2019). https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/spec-doc-rnd2/knot-spec-round.pdf
N. Mouha, B. Mennink, A. V. Herrewege, D. Watanabe, B. Preneel, I. Verbauwhede, Chaskey: an efficient MAC algorithm for 32-bit microcontrollers, in Selected Areas in Cryptography - SAC 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers (2014). pp. 306–323. https://doi.org/10.1007/978-3-319-13051-4
N. Mouha, Chaskey: a MAC algorithm for microcontrollers - status update and proposal of chaskey-12 -. IACR Cryptology 1182, 201 (2015)
G. Bertoni, J. Daemen, M. Peeters, G.V. Assche, Sponge function, in Ecrypt Hash Workshop (May 2007) (2007). https://keccak.team/files/CSF-0.1.pdf
Y. Bengio, Gradient-based optimization of hyperparameters. Neural Comput. 12(8), 1889–1900 (2000)
J. Bergstra Y. Bengio, Random search for hyper-parameter optimization. J. Mach. Learn. Res. 13(Feb), 281–305 (2012)
A.L. Maas, A.Y. Hannun, A.Y. Ng, Rectifier nonlinearities improve neural network acoustic models, in Proceedings of ICML, vol. 30, Issue 1, p. 3 (2013)
H. Maghrebi, T. Portigliatti, E. Prouff, Breaking cryptographic implementations using deep learning techniques, in Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings (2016), pp. 3–26. https://doi.org/10.1007/978-3-319-49445-6
E. Cagli, C. Dumas, E. Prouff, Convolutional neural networks with data augmentation against jitter-based countermeasures - profiling attacks without preprocessing, in Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings (2017), pp. 45–68 https://doi.org/10.1007/978-3-319-66787-4
M. Abadi, D.G. Andersen, Learning to protect communications with adversarial neural cryptography (2016). CoRR, abs/1610.06918. arXiv: 1610.06918
J. Daemen, V. Rijmen, The Design of Rijndael: The Advanced Encryption Standard (AES), 2nd edn. (Springer, Berlin, Heidelberg, 2020)
M.R. Albrecht, G. Leander, An all-in-one approach to differential cryptanalysis for small block ciphers, in Selected Areas in Cryptography, 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers (2012), pp. 1–15. https://doi.org/10.1007/978-3-642-35999-6%5C_1
D.J. Bernstein, S. Kölbl, S. Lucks, P.M.C. Massolino, F. Mendel, K. Nawaz, T. Schneider, P. Schwabe, F. Standaert, Y. Todo, B. Viguier, Gimli, 2019. https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/spec-doc-rnd2/gimli-spec-round2.pdf
A. Baksi, J. Breier, V.A. Dasu, X. Dong, C. Yi, Following-up on machine learning assisted differential distinguishers, in SILC Workshop - Security and Implementation of Lightweight Cryptography (2021). https://www.esat.kuleuven.be/cosic/events/silc2020/wp-content/uploads/sites/4/2020/10/Submission4.pdf
X. Lai, J.L. Massey, S. Murphy, Markov ciphers and differential cryptanalysis, in Advances in Cryptology-EUROCRYPT ’91, ed. by D.W. Davies (Springer, Berlin, Heidelberg, 1991) pp. 17–38. ISBN: 978-3-540-46416-7
S. Banik, S.K. Pandey, T. Peyrin, Y. Sasaki, S.M. Sim, Y. Todo, Gift: a small present. Cryptology ePrint Archive, Report 2017/622 (2017) https://eprint.iacr.org/2017/622
R. Beaulieu, D. Shors, J. Smith, S. Treatman-Clark, B.Weeks, L.Wingers, The simon and speck families of lightweight block ciphers. Cryptology ePrint Archive, Report 2013/404 (2013). https://eprint.iacr.org/2013/404
D.J. Bernstein, S. Kölbl, S. Lucks, P.M.C. Massolino, F. Mendel, K. Nawaz, T. Schneider, P. Schwabe, F. Standaert, Y. Todo, B. Viguier, Gimli : A crossplatform permutation, in Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings (2017), pp. 299–320. https://doi.org/10.1007/978-3-319-66787-4
G. Bertoni, J. Daemen, M. Peeters, G.V. Assche, Duplexing the sponge: single-pass authenticated encryption and other applications, in Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers (2011), pp. 320–337. http://dx.doi.org/10.1007/978-3-642-28496-0_19
E. Biham, A. Shamir, Differential cryptanalysis of des-like cryptosystems, in Advances in Cryptology - CRYPTO ’90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings (1990), pp. 2–21. https://doi.org/10.1007/3-540-38424-3_1
A. Gohr, Improving attacks on round-reduced speck32/64 using deep learning, in Advances in Cryptology - CRYPTO 2019, ed. by A. Boldyreva, D. Micciancio (2019), pp. 150–179 (Springer International Publishing, Cham, 2019). ISBN: 978-3-030-26951-7
N. Mouha, Q. Wang, D. Gu, B. Preneel, Differential and linear cryptanalysis using mixed-integer linear programming, in Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers (2011), pp. 57–76. https://doi.org/10.1007/978-3-642-34704-7%5C_5
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Baksi, A. (2022). Machine Learning-Assisted Differential Distinguishers for Lightweight Ciphers. In: Classical and Physical Security of Symmetric Key Cryptographic Algorithms. Computer Architecture and Design Methodologies. Springer, Singapore. https://doi.org/10.1007/978-981-16-6522-6_6
Download citation
DOI: https://doi.org/10.1007/978-981-16-6522-6_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-6521-9
Online ISBN: 978-981-16-6522-6
eBook Packages: EngineeringEngineering (R0)