2020
DOI: 10.1155/2020/3701067
|View full text |Cite
|
Sign up to set email alerts
|

Deep Learning-Based Cryptanalysis of Lightweight Block Ciphers

Abstract: Most of the traditional cryptanalytic technologies often require a great amount of time, known plaintexts, and memory. This paper proposes a generic cryptanalysis model based on deep learning (DL), where the model tries to find the key of block ciphers from known plaintext-ciphertext pairs. We show the feasibility of the DL-based cryptanalysis by attacking on lightweight block ciphers such as simplified DES, Simon, and Speck. The results show that the DL-based cryptanalysis can successfully recover the key bit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
48
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 44 publications
(48 citation statements)
references
References 30 publications
0
48
0
Order By: Relevance
“…Their findings showed that the trained models were able to generalize to ciphers that the models have not seen before. Last but not least, [30] attempted key recovery attacks on block ciphers, Simon and Speck, using deep learning. They were successful in recovering encryption keys for full-round Simon32/64 and Speck32/64 only when the keyspace was restricted to text-based keys.…”
Section: Background a Related Workmentioning
confidence: 99%
“…Their findings showed that the trained models were able to generalize to ciphers that the models have not seen before. Last but not least, [30] attempted key recovery attacks on block ciphers, Simon and Speck, using deep learning. They were successful in recovering encryption keys for full-round Simon32/64 and Speck32/64 only when the keyspace was restricted to text-based keys.…”
Section: Background a Related Workmentioning
confidence: 99%
“…e goal of this paper is to develop a novel machine learning-based protocol analysis scheme with much better efficiency that can discover more security attacks and vulnerabilities. Previously, the application of machine learning in security analysis has been mainly limited to side-channel attack [10,11] and symmetric cryptoanalysis [12,13]. Our motivation for applying machine learning in protocol analysis is described as follows:…”
Section: Motivation and Goal Of Is Papermentioning
confidence: 99%
“…Roughly speaking, cryptanalysis aims to test and analyze the security of cryptographic protocols by feeding different inputs to the cryptographic algorithm and analyzing the outputs in order to find a common or repetitive pattern in the outputs that might help find the secret key or even decrypt the ciphertext without access to the key. Machine learning can help learn from the data generated by the cryptographic algorithm and detect significant patterns [6]- [8] In late 90's and early 2000's, several cryptographic protocols using machine learning and deep learning models were proposed such as [9]- [11], but were deemed insecure and even some concrete attacks [12] were shown subsequently. The interest in neural network based cryptography took a dip because of the fact that simple computations, even as basic as exclusive-or (XOR) operation could not be computed by simple neural networks.…”
Section: Introductionmentioning
confidence: 99%