Skip to main content

2024 | OriginalPaper | Buchkapitel

Comparative Analysis of ResNet and DenseNet for Differential Cryptanalysis of SPECK 32/64 Lightweight Block Cipher

verfasst von : Ayan Sajwan, Girish Mishra

Erschienen in: Cryptology and Network Security with Machine Learning

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This research paper explores the vulnerabilities of the lightweight block cipher SPECK 32/64 through the application of differential analysis and deep learning techniques. The primary objectives of the study are to investigate the cipher’s weaknesses and to compare the effectiveness of ResNet as used by Aron Gohr at Crypto2019 and DenseNet. The methodology involves conducting an analysis of differential characteristics to identify potential weaknesses in the cipher’s structure. Experimental results and analysis demonstrate the efficacy of both approaches in compromising the security of SPECK 32/64.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Doukas N, Karadimas NV (2008) A blind source separation based cryptography scheme for mobile military communication applications. WSEAS Trans Commun 7(12):1235–1245 Doukas N, Karadimas NV (2008) A blind source separation based cryptography scheme for mobile military communication applications. WSEAS Trans Commun 7(12):1235–1245
2.
Zurück zum Zitat Lamprecht C et al (2006) Investigating the efficiency of cryptographic algorithms in online transactions. Int J Simul: Syst Sci Technol 7(2):63–75 Lamprecht C et al (2006) Investigating the efficiency of cryptographic algorithms in online transactions. Int J Simul: Syst Sci Technol 7(2):63–75
3.
Zurück zum Zitat Menezes AJ, Van Oorschot PC, Vanstone SA (2018) Handbook of applied cryptography. CRC Press Menezes AJ, Van Oorschot PC, Vanstone SA (2018) Handbook of applied cryptography. CRC Press
4.
Zurück zum Zitat Mahajan P, Sachdeva A (2013) A study of encryption algorithms AES, DES and RSA for security. Glob J Comput Sci Technol 13(15):15–22 Mahajan P, Sachdeva A (2013) A study of encryption algorithms AES, DES and RSA for security. Glob J Comput Sci Technol 13(15):15–22
7.
Zurück zum Zitat Benamira A, Gerault D, Peyrin T, Tan QQ (2021) A deeper look at machine learning-based cryptanalysis. In: Canteaut A, Standaert FX (eds) Advances in cryptology—EUROCRYPT 2021. Lecture notes in computer science, vol 12696. Springer, Cham. https://doi.org/10.1007/978-3-030-77870-5_28 Benamira A, Gerault D, Peyrin T, Tan QQ (2021) A deeper look at machine learning-based cryptanalysis. In: Canteaut A, Standaert FX (eds) Advances in cryptology—EUROCRYPT 2021. Lecture notes in computer science, vol 12696. Springer, Cham. https://​doi.​org/​10.​1007/​978-3-030-77870-5_​28
8.
Zurück zum Zitat Deng L, Hinton G, Kingsbury B (2013) New types of deep neural network learning for speech recognition and related applications: an overview. In: 2013 IEEE international conference on acoustics, speech and signal processing, Vancouver, BC, Canada, 2013, pp 8599–8603. https://doi.org/10.1109/ICASSP.2013.6639344 Deng L, Hinton G, Kingsbury B (2013) New types of deep neural network learning for speech recognition and related applications: an overview. In: 2013 IEEE international conference on acoustics, speech and signal processing, Vancouver, BC, Canada, 2013, pp 8599–8603. https://​doi.​org/​10.​1109/​ICASSP.​2013.​6639344
12.
Zurück zum Zitat Cazorla M, Marquet K, Minier M (2013) Survey and benchmark of lightweight block ciphers for wireless sensor networks. In: 2013 international conference on security and cryptography (SECRYPT), Reykjavik, Iceland, pp 1–6 Cazorla M, Marquet K, Minier M (2013) Survey and benchmark of lightweight block ciphers for wireless sensor networks. In: 2013 international conference on security and cryptography (SECRYPT), Reykjavik, Iceland, pp 1–6
13.
Zurück zum Zitat Manifavas C, Hatzivasilis G, Fysarakis K, Rantos K (2014) Lightweight cryptography for embedded systems—a comparative analysis. In: Garcia-Alfaro J, Lioudakis G, Cuppens-Boulahia N, Foley S, Fitzgerald W (eds) Data privacy management and autonomous spontaneous security. DPM SETOP 2013. Lecture notes in computer science, vol 8247. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54568-9_21 Manifavas C, Hatzivasilis G, Fysarakis K, Rantos K (2014) Lightweight cryptography for embedded systems—a comparative analysis. In: Garcia-Alfaro J, Lioudakis G, Cuppens-Boulahia N, Foley S, Fitzgerald W (eds) Data privacy management and autonomous spontaneous security. DPM SETOP 2013. Lecture notes in computer science, vol 8247. Springer, Berlin, Heidelberg. https://​doi.​org/​10.​1007/​978-3-642-54568-9_​21
14.
Zurück zum Zitat Nyberg K (1996) Generalized Feistel networks. In: Kim K, Matsumoto T (eds) Advances in cryptology—ASIACRYPT ’96. ASIACRYPT 1996. Lecture notes in computer science, vol 1163. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0034838 Nyberg K (1996) Generalized Feistel networks. In: Kim K, Matsumoto T (eds) Advances in cryptology—ASIACRYPT ’96. ASIACRYPT 1996. Lecture notes in computer science, vol 1163. Springer, Berlin, Heidelberg. https://​doi.​org/​10.​1007/​BFb0034838
15.
Zurück zum Zitat Beaulieu R et al (2013) The SIMON and SPECK families of lightweight block ciphers. Cryptology eprint archive Beaulieu R et al (2013) The SIMON and SPECK families of lightweight block ciphers. Cryptology eprint archive
16.
Zurück zum Zitat He K et al (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition He K et al (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition
18.
Zurück zum Zitat Jastrzȩbski S, Arpit D, Ballas N, Verma V, Che T, Bengio Y (2017) Residual connections encourage iterative inference. arXiv preprint arXiv:1710.04773 Jastrzȩbski S, Arpit D, Ballas N, Verma V, Che T, Bengio Y (2017) Residual connections encourage iterative inference. arXiv preprint arXiv:​1710.​04773
19.
Zurück zum Zitat Gohr A (2019) Improving attacks on round-reduced speck32/64 using deep learning. In: Advances in cryptology—CRYPTO 2019: 39th annual international cryptology conference, Santa Barbara, CA, USA, 18–22 Aug 2019, proceedings, Part II 39. Springer Gohr A (2019) Improving attacks on round-reduced speck32/64 using deep learning. In: Advances in cryptology—CRYPTO 2019: 39th annual international cryptology conference, Santa Barbara, CA, USA, 18–22 Aug 2019, proceedings, Part II 39. Springer
20.
Zurück zum Zitat Ioffe S, Szegedy C (2015) Batch normalization: accelerating deep network training by reducing internal covariate shift. In: International conference on machine learning. PMLR Ioffe S, Szegedy C (2015) Batch normalization: accelerating deep network training by reducing internal covariate shift. In: International conference on machine learning. PMLR
22.
Zurück zum Zitat Huang G et al (2017) Densely connected convolutional networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition Huang G et al (2017) Densely connected convolutional networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition
23.
Zurück zum Zitat Toro-Vizcarrondo C, Dudley Wallace T (1968) A test of the mean square error criterion for restrictions in linear regression. J Am Stat Assoc 63(322):558–572 Toro-Vizcarrondo C, Dudley Wallace T (1968) A test of the mean square error criterion for restrictions in linear regression. J Am Stat Assoc 63(322):558–572
Metadaten
Titel
Comparative Analysis of ResNet and DenseNet for Differential Cryptanalysis of SPECK 32/64 Lightweight Block Cipher
verfasst von
Ayan Sajwan
Girish Mishra
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0641-9_34

Neuer Inhalt