Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher

Authors
Publication date 2023
Host editors
  • G.-V. Jourdan
  • L. Mounier
  • C. Adams
  • F. Sèdes
  • J. Garcia-Alfaro
Book title Foundations and Practice of Security
Book subtitle 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12–14, 2022 : revised selected papers
ISBN
  • 9783031301216
ISBN (electronic)
  • 9783031301223
Series Lecture Notes in Computer Science
Event 15th International Symposium on Foundations and Practice of Security, FPS 2022
Pages (from-to) 123-141
Number of pages 19
Publisher Cham: Springer
Organisations
  • Faculty of Science (FNWI) - Informatics Institute (IVI)
Abstract

In a differential cryptanalysis attack, the attacker tries to observe a block cipher’s behavior under an input difference: if the system’s resulting output differences show any non-random behavior, a differential distinguisher is obtained. While differential cryptanlysis has been known for several decades, Gohr was the first to propose in 2019 the use of machine learning (ML) to build a distinguisher. In this paper, we present the first Partial Differential (PD) ML distinguisher, and demonstrate its effectiveness on cipher SPECK32/64. As a PD-ML-distinguisher is based on a selection of bits rather than all bits in a block, we also study if different selections of bits have different impact in the accuracy of the distinguisher, and we find that to be the case. More importantly, we also establish that certain bits have reliably higher effectiveness than others, through a series of independent experiments on different datasets, and we propose an algorithm for assigning an effectiveness score to each bit in the block. By selecting the highest scoring bits, we are able to train a partial ML-distinguisher over 8-bits that is almost as accurate as an equivalent ML-distinguisher over the entire 32 bits (68.8% against 72%), for six rounds of SPECK32/64. Furthermore, we demonstrate that our obtained machine can reduce the time complexity of the key-averaging algorithm for training a 7-round distinguisher by a factor of 25 at a cost of only 3% in the resulting machine’s accuracy. These results may therefore open the way to the application of (partial) ML-based distinguishers to ciphers whose block size has so far been considered too large.

Document type Conference contribution
Language English
Published at https://doi.org/10.1007/978-3-031-30122-3_8
Other links https://www.scopus.com/pages/publications/85152567990
Permalink to this page
Back