Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (2): 154-163.doi: 10.11959/j.issn.2096-109x.2023029
• Papers • Previous Articles Next Articles
Zezhou HOU1,2, Jiongjiong REN1,2, Shaozhen CHEN1,2
Revised:
2022-03-28
Online:
2023-04-25
Published:
2023-04-01
Supported by:
CLC Number:
Zezhou HOU, Jiongjiong REN, Shaozhen CHEN. Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher[J]. Chinese Journal of Network and Information Security, 2023, 9(2): 154-163.
"
类别 | 准确率Acc(a,b,c) | 等价类代表元(a,b,c) |
A | [0.5,0.6) | (10,15,3),(1,6,3),(3,12,7),(4,9,6),(1,12,3),(4,13,7),(5,12,6),(2,11,1),(5,14,1),(5,12,1),(1,12,5),(4,11,1),(7,12,3), (7,14,1),(7,12,6),(3,12,2),(3,14,5),(2,7,1),(4,13,1),(4,11,6),(4,15,3),(5,6,1),(1,12,2),(10,11,1),(11,12,1),(2,15,3), (6,7,1),(1,14,3), (14,15,9),(1,10,5),(4,7,2),(7,14,3),(7,10,1),(5,6,3),(12,13,1),(4,5,1),(2,3,5),(4,5,2), |
B | [0.6,0.7) | (4,7,1),(6,7,4),(10,13,2),(10,15,2), |
C | [0.7,0.8) | (4,15,1),(11,12,3),(8,9,4),(8,11,4),(1,8,4),(4,9,1),(12,15,1),(9,12,1),(6,9,4),(3,8,1),(8,9,3),(3,10,1),(3,8,4),(7,14,2), (1,8,9),(10,11,6),(0,3,4),(6,7,10),(1,6,4),(0,3,1),(10,15,6),(2,15,5),(2,7,4),(0,1,4),(5,14,2),(3,14,2),(2,3,1),(1,14,2), (14,15,2),(0,9,1),(8,9,1),(6,13,4),(2,9,8),(7,10,4),(1,10,0),(1,2,8),(5,6,4), |
D | [0.8,0.9) | (1,4,8),(4,7,0),(4,5,8), |
E | [0.9,1.0) | (1,6,8),(5,6,0),(2,3,8),(2,7,0),(1,6,6),(2,7,2),(5,6,6),(2,3,2),(2,7,7),(1,6,1),(1,14,1),(2,3,3),(2,9,2),(1,10,10),(4,7,7 (2,5,2),(1,12,1),(1,2,2),(1,4,1),(4,5,5),(2,9,9),(1,10,1),(2,5,5),(1,2,1),(3,12,4),(1,8,0),(1,12,4),(12,15,4),(12,13,4), (8,15,1),(8,9,0),(0,1,8),(7,8,9),(0,15,1),(1,10,8),(2,9,0),(2,5,8),(1,2,0),(4,7,4),(4,5,4),(1,4,4),(3,4,4),(1,8,1),(8,9,9), (0,1,1),(1,8,8),(8,9,8),(0,1,0) |
"
循环参数 | 准确率 | 所属类别 |
(0,1,2) | 0.816 2 | D |
(0,1,3) | 0.560 9 | A |
(1,2,3) | 0.577 9 | A |
(3,4,5) | 0.582 9 | A |
(0,5,10) | 0.816 2 | D |
(0,5,15) | 0.560 9 | A |
(4,5,3) | 0.607 0 | B |
(0,7,14) | 0.816 2 | D |
(6,7,5) | 0.559 4 | A |
(1,8,3) | 0.554 5 | A |
(3,8,14) | 0.797 78 | C |
(7,8,5) | 0.554 5 | A |
(5,10,15) | 0.577 9 | A |
(6,11,1) | 0.547 0 | A |
(1,12,7) | 0.582 9 | A |
(5,12,3) | 0.582 9 | A |
(7,12,1) | 0.587 4 | A |
(0,13,10) | 0.816 2 | D |
(0,13,7) | 0.560 9 | A |
(8,13,2) | 0.795 1 | C |
[1] | IZADI M , SADEGHIYAN B , SADEGHIAN S S ,et al. MIBS:a new lightweight block cipher[C]// Proceedings of the Cryptology and Network Security. 2009: 334-348. |
[2] | BOGDANOV A , KNUDSEN L R , LEANDER G ,et al. Present:an ultra-lightweigtht block cipher[C]// Proceedings of the Cryptographic Hardware and Embedded Systems. 2007: 450-466. |
[3] | BONWOOK K , DONGYOUNG R , HYEONJIN K ,et al. CHAM:a family of lightweight block ciphers for resource-constrained devices[C]// Proceedings of the Information Security and Cryptology. 2017: 3-25. |
[4] | WU W L , ZHANG L . LBlock:a lightweight block cipher[C]// Proceedings of the Applied Cryptography and Network Security. 2011: 327-344. |
[5] | BEAUKIEU R , SHORS D , SMITH J ,et al. The SIMON and SPECK lightweight block ciphers[C]// Proceedings of the 52nd Annual Design Automation Conference. 2015: 1-6. |
[6] | K?LBL S , LEANDER G , TIESSEN T . Observations on the SIMON block cipher family[C]// Proceedings of the Advances in Cryptology. 2015: 161-185. |
[7] | ZHANG H L , WU W . Structural evaluation for SIMON-like designs against integral attack[C]// Proceedings of the Information Security Practice and Experience. 2016: 194-208. |
[8] | KONDO K , YU S , IWATA T . On the design rationale of SIMON block cipher:Integral attacks and impossible differential attacks against SIMON variants[C]// Proceedings of the Applied Cryptography and Network Security. 2016: 518-536. |
[9] | 张毅, 刘国强, 李超 . 类 SIMON 算法参数等价类研究[J]. 密码学报, 2019,6(3): 293-303. |
ZHANG Y , LIU G Q , LI C . Research on equivalent class of SI MON-like cipher parameters[J]. Journal of Cryptologic Research, 2019,6(3): 293-303. | |
[10] | ZEYNEP A , ANDREAS G , TORSTEN S . Computer vision and pattern recognition 2020[J]. International Journal of Computer Vision, 2021,129(12). |
[11] | FABRIZIO B , ALESSANDRO M . Computer vision meets image processing and UAS PhotoGrammetric data integration:from HBIM to the eXtended reality project of arco della pace in milan and its decorative complexity[J]. Journal of Imaging, 2021,7(7): 118. |
[12] | MATTIA V , MAURO G . Analysis of news sentiments using natural language processing and deep learning[J]. AI & Society, 2021,36(3): 931-937. |
[13] | LI J J , LIU X K , YIN W P ,et al. Empirical evaluation of multi-task learning in deep neural networks for natural language processing[J]. Neural Computing and Applications, 2021,33(9): 4417-4428. |
[14] | CHEN D J , ZHAO Z H , QIN X ,et al. MAGLeak:a learning-based side-channel attack for password recognition with multiple sensors in IIoT environment[J]. IEEE Transactions on Industrial Informatics, 2022,18(1): 467-476. |
[15] | ROBISSOUT R , BOSSUET L , HABRARD A ,et al. Improving deep learning networks for profiled side-channel analysis using performance improvement techniques[J]. ACM Journal on Emerging Technologies in Computing Systems, 2021,17(3): 1-30. |
[16] | GOHR A , . Improving attacks on round-reduced speck32/64 using deep learning[C]// Proceedings of the Advances in Cryptology. 2019: 150-179. |
[17] | BENAMIRA A , GERAULT D , PEYRIN T ,et al. A deeper look at machine learning-based cryptanalysis[C]// Proceedings of the Advances in Cryptology. 2021: 805-835. |
[18] | HE K M , ZHANG X Y , REN S Q ,et al. Deep residual learning for image recognition[C]// Proceedings of the Conference on Computer Vision and Pattern Recognition. 2016: 770-778. |
[19] | YI C , YU H B . Bridging machine learning and cryptanalysis via EDLCT[J]. IACR Cryptology ePrint Archive, 2021,705: 1-30. |
[20] | LEONARDO M M , NIKOLAJ B . Z3:an efficient SMT solver[C]// Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems. 2008: 337-340. |
[21] | YANG G Q , ZHU B , SUDER V ,et al. The simeck family of lightweight block ciphers[C]// Proceedings of the Cryptographic Hardware and Embedded Systems. 2015: 307-329. |
[1] | Xianyi CHEN, Jun GU, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU. Double adversarial attack against license plate recognition system [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 16-27. |
[2] | Tianpeng YE, Xiang LIN, Jianhua LI, Xuankai ZHANG, Liwen XU. Personalized lightweight distributed network intrusion detection system in fog computing [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 28-37. |
[3] | Lijun ZU, Yalin CAO, Xiaohua MEN, Zhihui LYU, Jiawei YE, Hongyi LI, Liang ZHANG. Adaptive selection method of desensitization algorithm based on privacy risk assessment [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 49-59. |
[4] | Ruiqi XIA, Manman LI, Shaozhen CHEN. Identification on the structures of block ciphers using machine learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 79-89. |
[5] | Jingyi YUAN, Zichuan LI, Guojun PENG. EN-Bypass: a security assessment method on e-mail user interface notification [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 90-101. |
[6] | Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG. Privacy-enhanced federated learning scheme based on generative adversarial networks [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 113-122. |
[7] | Chuntao ZHU, Chengxi YIN, Bolin ZHANG, Qilin YIN, Wei LU. Forgery face detection method based on multi-domain temporal features mining [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 123-134. |
[8] | Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN. Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 135-149. |
[9] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[10] | Yan PAN, Wei LIN, Yuefei ZHU. Progressive active inference method of protocol state machine [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 81-93. |
[11] | Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU. Binary program taint analysis optimization method based on function summary [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 115-131. |
[12] | Tian XIAO, Zhihao JIANG, Peng TANG, Zheng HUANG, Jie GUO, Weidong QIU. High-performance directional fuzzing scheme based on deep reinforcement learning [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 132-142. |
[13] | Chenghao YUAN, Yong LI, Shuang REN. Dynamic multi-keyword searchable encryption scheme [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 143-153. |
[14] | Xuejing GUO, Yixiang FANG, Yi ZHAO, Tianzhu ZHANG, Wenchao ZENG, Junxiang WANG. Traditional guidance mechanism based deep robust watermarking [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 175-183. |
[15] | Beiyuan YU, Shanyao REN, Jianwei LIU. Overview of blockchain assets theft attacks and defense technology [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 1-17. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|