In CRYPTO 2019, Gohr made a pioneering attempt and successfully applied deep learning to the differential cryptanalysis against NSA block cipher SPECK32/64, achieving higher accuracy than the pure differential distinguishers. By its very nature, mining effective features in data plays a crucial role in data-driven deep learning. In this paper, in addition to considering the integrity of the information from the training data of the ciphertext pair, domain knowledge about the structure of differential cryptanalysis is also considered into the training process of deep learning to improve the performance. Meanwhile, taking the performance of the differential-neural distinguisher of SIMON32/64 as an entry point, we investigate the impact of input difference on the performance of the hybrid distinguishers to choose the proper input difference. Eventually, we improve the accuracy of the neural distinguishers of SIMON32/64, SIMON64/128, SIMECK32/64, and SIMECK64/128. We also obtain related-key differential-based neural distinguishers on round-reduced versions of SIMON32/64, SIMON64/128, SIMECK32/64, and SIMECK64/128 for the first time.
翻译:在CRYPTO 2019年,Gohr在CRYPTO 2019年中进行了开创性尝试,并成功地深入学习了针对国安局区块的差分加密分析(ciper SPECK32/64),取得了比纯粹差异区分器更高的准确性。数据中的采矿有效特征就其性质而言,在数据驱动的深层次学习中发挥着关键作用。在本文件中,除了考虑来自密码对等培训数据的信息的完整性外,关于差异加密分析结构的域知识也被纳入深层次学习的训练过程,以改善绩效。与此同时,以SIMONTO32/64/64的差别区分器作为切入点,我们调查投入差异对混合区分器的性能的影响,以选择适当的投入差异。最终,我们提高了SIMONT32/64、SIMON64/128、SIMECK/64、SIMEC64/128的神经区分器的准确性度,用于第一次时间的SIMEC64/128。