Improved Neural Differential Distinguisher Model for Lightweight Cipher Speck
-
Published:2023-06-09
Issue:12
Volume:13
Page:6994
-
ISSN:2076-3417
-
Container-title:Applied Sciences
-
language:en
-
Short-container-title:Applied Sciences
Author:
Yue Xiaoteng12, Wu Wanqing12
Affiliation:
1. School of Cyber Security and Computer, Hebei University, Baoding 071002, China 2. Key Laboratory on High Trusted Information System in Hebei Province, Baoding 071002, China
Abstract
At CRYPTO 2019, Gohr proposed the neural differential distinguisher using the residual network structure in convolutional neural networks on round-reduced Speck32/64. In this paper, we construct a 7-round differential neural distinguisher for Speck32/64, which results in better than Gohr’s work. The details are as follows. Firstly, a new data format (C_r,C_r′,d_l,Cl,Cr,Cl′,Cr′) is proposed for the input data of the differential neural distinguisher, which can help the distinguisher to identify the features of the previous round of ciphertexts in the Speck algorithm. Secondly, this paper modifies the convolution layer of the residual block in the residual network, inspired by the Inception module in GoogLeNet. For Speck32/64, the experiments show that the accuracy of the 7-round differential neural distinguisher is 97.13%, which is better than the accuracy of Gohr’s distinguisher of 9.1% and also higher than the currently known accuracy of 89.63%. The experiments also show that the data format and neural network in this paper can improve the accuracy of the distinguisher by 2.38% and 2.1%, respectively. Finally, to demonstrate the effectiveness of the distinguisher in this paper, a key recovery attack is performed on 8-rounds of Speck32/64. The results show that the success rate of recovering the correct key is 92%, with no more than two incorrect bits. Finally, this paper briefly discussed the effect of the number of ciphertext pairs in a sample on the training results of the differential neural distinguisher. When the total number of ciphertext pairs is kept constant, the accuracy of the distinguisher increases with s, but it also leads to the occurrence of overfitting.
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference21 articles.
1. Hai, Z., Zhou, J., Lu, Y., Jawawi, D., Wang, D., Onyema, E.M., and Biamba, C. (2023). Enhanced security using multiple paths routine scheme in cloud-MANETs. J. Cloud Comput., 12. 2. Onyema, E.M., Kumar, M.A., Balasubaramanian, S., Bharany, S., Rehman, A.U., Eldin, E.T., and Shafiq, M. (2022). A security policy protocol for detection and prevention of internet control message protocol attacks in software defined networks. Sustainability, 14. 3. Security in IoT Mesh Networks based on Trust Similarity;Kavitha;IEEE Access,2022 4. Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., and Wingers, L. (2013). The SIMON and SPECK families of lightweight block ciphers. IACR Cryptol. EPrint Arch., 404, Available online: https://eprint.iacr.org/2013/404. 5. Speck-R: An Ultra Light-Weight Cryptographic Scheme for Internet of Things;Sleem;Multimed. Tools Appl.,2021
|
|