Paper 2023/580

Neural-Linear Attack Based on Distribution Data and Its Application on DES

Rui Zhou, Information Engineering University, Henan Key Laboratory of Network Cryptography
Ming Duan, Information Engineering University, Henan Key Laboratory of Network Cryptography
Qi Wang, Information Engineering University
Qianqiong Wu, Information Engineering University
Sheng Guo, Information Engineering University
Lulu Guo, Information Engineering University
Zheng Gong, South China Normal University
Abstract

The neural-differential distinguisher proposed by Gohr boosted the development of neural aided differential attack. As another significant cryptanalysis technique, linear attack has not been developing as rapidly in combination with deep learning technology as differential attack. In 2020, Hou et al. proposed the first neural-linear attack with one bit key recovery on 3, 4 and 5-round DES and restricted multiple bits recovery on 4 rounds, where the effective bits in one plain-ciphertext pair are spliced as one data sample. In this paper, we compare the neural-linear cryptanalysis with neural-differential cryptanalysis and propose a new data preprocessing algorithm depending on their similarities and differences. We call the new data structure distribution data. Basing on it, we mount our key recovery on round-reduced DES—first, we raise the accuracy of the neural-linear distinguisher by about 50%. Second, our distinguisher improves the effectiveness of one bit key recovery against 3, 4 and 5-round DES than the former one, and attack 6-round DES with success rate of 60.6% using 2048 plain-ciphertext pairs. Third, we propose a real multiple bit key recovery algorithm, leading neural-linear attack from theory to practice.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Published elsewhere. ICITS 2023
Keywords
Linear cryptanalysisNeural-linear attackDeep learningData preprocessingDES
Contact author(s)
zhourui110 love @ 163 com
mdscinece @ sina com
wq2000888 @ qq com
2457262459 @ qq com
History
2023-04-28: approved
2023-04-24: received
See all versions
Short URL
https://ia.cr/2023/580
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/580,
      author = {Rui Zhou and Ming Duan and Qi Wang and Qianqiong Wu and Sheng Guo and Lulu Guo and Zheng Gong},
      title = {Neural-Linear Attack Based on Distribution Data and Its Application on DES},
      howpublished = {Cryptology ePrint Archive, Paper 2023/580},
      year = {2023},
      note = {\url{https://eprint.iacr.org/2023/580}},
      url = {https://eprint.iacr.org/2023/580}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.