Affiliation:
1. Center for Cybersecurity, Fondazione Bruno Kessler, 38122 Trento, Italy
2. Dipartimento di Informatica, Universitá di Salerno, 84084 Fisciano, Italy
Abstract
Pseudorandomness is a crucial property that the designers of cryptographic primitives aim to achieve. It is also a key requirement in the calls for proposals of new primitives, as in the case of block ciphers. Therefore, the assessment of the property is an important issue to deal with. Currently, an interesting research line is the understanding of how powerful machine learning methods are in distinguishing pseudorandom objects from truly random objects. Moving along such a research line, in this paper a deep learning-based pseudorandom distinguisher is developed and trained for two well-known lightweight ciphers, Speck and Simon. Specifically, the distinguisher exploits a convolutional Siamese network for distinguishing the outputs of these ciphers from random sequences. Experiments with different instances of Speck and Simon show that the proposed distinguisher highly able to distinguish between the two types of sequences, with an average accuracy of 99.5% for Speck and 99.6% for Simon. Hence, the proposed method could significantly impact the security of these cryptographic primitives and of the applications in which they are used.
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference38 articles.
1. Rukhin, A., Soto, J., Nechvatal, J., Smid, M., and Barker, E. (2001). A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, Booz-Allen and Hamilton Inc.. Technical Report.
2. Testing randomness in ciphertext of block-ciphers using DieHard tests;Alani;Int. J. Comput. Sci. Netw. Secur,2010
3. TestU01: AC library for empirical testing of random number generators;Simard;Acm Trans. Math. Softw. (Toms),2007
4. Walker, J. (2023, February 15). ENT: A Pseudorandom Number Sequence Test Program.Software and Documentation. Available online: https://www.fourmilab.ch.
5. Gohr, A. (2019, January 18–22). Improving attacks on round-reduced speck32/64 using deep learning. Proceedings of the 39th Annual International Cryptology Conference, Santa Barbara, CA, USA.