Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher
| Authors |
|
|---|---|
| Publication date | 2023 |
| Host editors |
|
| Book title | Foundations and Practice of Security |
| Book subtitle | 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12–14, 2022 : revised selected papers |
| ISBN |
|
| ISBN (electronic) |
|
| Series | Lecture Notes in Computer Science |
| Event | 15th International Symposium on Foundations and Practice of Security, FPS 2022 |
| Pages (from-to) | 123-141 |
| Number of pages | 19 |
| Publisher | Cham: Springer |
| Organisations |
|
| Abstract |
In a differential cryptanalysis attack, the attacker tries to observe a block cipher’s behavior under an input difference: if the system’s resulting output differences show any non-random behavior, a differential distinguisher is obtained. While differential cryptanlysis has been known for several decades, Gohr was the first to propose in 2019 the use of machine learning (ML) to build a distinguisher. In this paper, we present the first Partial Differential (PD) ML distinguisher, and demonstrate its effectiveness on cipher SPECK32/64. As a PD-ML-distinguisher is based on a selection of bits rather than all bits in a block, we also study if different selections of bits have different impact in the accuracy of the distinguisher, and we find that to be the case. More importantly, we also establish that certain bits have reliably higher effectiveness than others, through a series of independent experiments on different datasets, and we propose an algorithm for assigning an effectiveness score to each bit in the block. By selecting the highest scoring bits, we are able to train a partial ML-distinguisher over 8-bits that is almost as accurate as an equivalent ML-distinguisher over the entire 32 bits (68.8% against 72%), for six rounds of SPECK32/64. Furthermore, we demonstrate that our obtained machine can reduce the time complexity of the key-averaging algorithm for training a 7-round distinguisher by a factor of 25 at a cost of only 3% in the resulting machine’s accuracy. These results may therefore open the way to the application of (partial) ML-based distinguishers to ciphers whose block size has so far been considered too large. |
| Document type | Conference contribution |
| Language | English |
| Published at | https://doi.org/10.1007/978-3-031-30122-3_8 |
| Other links | https://www.scopus.com/pages/publications/85152567990 |
| Permalink to this page | |