Journal on Communications ›› 2023, Vol. 44 ›› Issue (7): 171-184.doi: 10.11959/j.issn.1000-436x.2023141
• Papers • Previous Articles
Huijiao WANG, Xin ZHANG, Yongzhuang WEI, Lingchen LI
Revised:
2023-07-13
Online:
2023-07-01
Published:
2023-07-01
Supported by:
CLC Number:
Huijiao WANG, Xin ZHANG, Yongzhuang WEI, Lingchen LI. Novel distinguisher for SM4 cipher algorithm based on deep learning[J]. Journal on Communications, 2023, 44(7): 171-184.
"
区分器轮数 | 输入结构I | 输入结构I' | 文献[ | 文献[ |
4 | 1.000 0 | 1.000 0 | 1.000 0 | 1.000 0 |
5 | 0.739 4±0.695×10-3 | 0.757 6±3.751×10-3 | 0.750 1±2.391×10-3 | 0.748 2±3.362×10-3 |
6 | 0.636 1±1.310×10-3 | 0.648 8±3.160×10-3 | 0.642 4±3.218×10-3 | 0.640 8±2.561×10-3 |
7 | 0.580 2±1.160×10-3 | 0.591 4±1.415×10-3 | 0.591 6±2.013×10-3 | 0.590 2±1.831×10-3 |
8 | 0.548 8±1.600×10-3 | 0.553 7±5.187×10-3 | 0.550 3±1.946×10-3 | 0.549 7±2.157×10-3 |
9 | — | 0.535 6±1.714×10-3 | 0.533 4±1.437×10-3 | 0.532 7±1.166×10-3 |
"
轮数 | 数据复杂度/个 | 时间复杂度/次 | 存储复杂度/B | 准确率 | |||||||
本文 | 文献[ | 本文 | 文献[ | 本文 | 文献[ | 本文 | 文献[ | ||||
5 | 28 | 231 | 25.68 | 228.68 | 212.58 | 235 | 0.551 2±2.364×10-3 | 2-31 | |||
6 | 212 | 237 | 29.42 | 234.42 | 216.58 | 241 | 0.558 2±3.203×10-3 | 2-37 | |||
7 | 215 | 244 | 212.19 | 241.19 | 219.58 | 248 | 0.552 1±1.643×10-3 | 2-44 | |||
8 | 219 | 251 | 216 | 248 | 223.58 | 255 | 0.534 4±3.135×10-3 | 2-51 | |||
9 | 221 | 258 | 217.83 | 254.83 | 225.58 | 262 | 0.533 2±1.412×10-3 | 2-58 |
"
轮数 | 本文 | MLPⅢ | MLPⅣ | CNNⅡ |
5 | 0.757 6±3.751×10-3 | 0.742 1±1.314×10-3 | 0.738 5±1.128×10-3 | 0.714 8±1.227×10-3 |
6 | 0.648 8±3.160×10-3 | 0.641 3±3.225×10-3 | 0.639 4±1.715×10-3 | 0.623 5±1.621×10-3 |
7 | 0.591 4±1.415×10-3 | 0.587 5±1.127×10-3 | 0.582 1±2.651×10-3 | 0.577 2±1.231×10-3 |
8 | 0.553 7±5.187×10-3 | 0.548 5±1.311×10-3 | 0.546 9±1.422×10-3 | 0.529 3±1.150×10-3 |
9 | 0.535 6±1.714×10-3 | 0.533 5±1.260×10-3 | 0.530 5±1.341×10-3 | — |
"
输入差分 | 汉明权重 | 准确率 |
(0x0,0x0,0x0,0x4) | 1 | 0.749 7~0.759 6 |
(0x0,0x0,0x2,0x0) | ||
(0x0,0x1,0x0,0x0) | ||
(0x0,0x0,0x2,0x4) | 2 | 0.753 3~0.756 2 |
(0x0,0x1,0x0,0x2) | ||
(0x0,0x2,0x8,0x0) | ||
(0x2,0x0,0x4,0x8) | 3 | 0.755 1~0.762 3 |
(0x1,0x4,0x8,0x0) | ||
(0x1,0x2,0x4,0x8) | ||
(0x2,0x4,0x8,0x8) | 4 | 0.651 7~0.752 5 |
(0x10000000,0x10,0x20,0x40) | ||
(0x24804104,0x10408802,0x2081008,0x 8242200) | ||
(0xe93f7be,0xae74a9ae,0xe9e17be9,0x47 9dd247) | >4 | 0.590 1~0.599 8 |
(0x20804104,0x800,0x2000008,0x200200) (0x10000000,0x7,0x2000000,0x200) |
[1] | 马南峰, 姚锡凡, 王柯赛 . 面向未来互联网的智慧制造研究现状与展望[J]. 中国科学(技术科学), 2022,52(1): 55-75. |
MA N F , YAO X F , WANG K S . Current status and prospect of future Internet-oriented wisdom manufacturing[J]. Scientia Sinica (Technologica), 2022,52(1): 55-75. | |
[2] | MAZON-OLIVO B , PAN A . Internet of things:state-of-the-art,computing paradigms and reference architectures[J]. IEEE Latin America Transactions, 2022,20(1): 49-63. |
[3] | LV X J , LI M H . Application and research of the intelligent management system based on Internet of things technology in the era of big data[J]. Mobile Information Systems, 2021,2021: 1-6. |
[4] | BIHAM E , SHAMIR A . Differential cryptanalysis of DES-like cryptosystems[J]. Journal of Cryptology, 1991,4(1): 3-72. |
[5] | MATSUI M . Linear cryptanalysis method for DES cipher[C]// Workshop on the Theory and Application of Cryptographic Techniques. Berlin:Springer, 1993: 386-397. |
[6] | KNUDSEN L R , WAGNER D . Integral cryptanalysis[C]// Proceedings of International Workshop on Fast Software Encryption. Berlin:Springer, 2002: 112-127. |
[7] | BOGDANOV A , RIJMEN V . Linear hulls with correlation zero and linear cryptanalysis of block ciphers[J]. Designs,Codes and Cryptography, 2014,70(3): 369-383. |
[8] | 李志欣, 魏海洋, 黄飞成 ,等. 结合视觉特征和场景语义的图像描述生成[J]. 计算机学报, 2020,43(9): 1624-1640. |
LI Z X , WEI H Y , HUANG F C ,et al. Combine visual features and scene semantics for image captioning[J]. Chinese Journal of Computers, 2020,43(9): 1624-1640. | |
[9] | 赵京胜, 宋梦雪, 高祥 ,等. 自然语言处理中的文本表示研究[J]. 软件学报, 2022,33(1): 102-128. |
ZHAO J S , SONG M X , GAO X ,et al. Research on text representation in natural language processing[J]. Journal of Software, 2022,33(1): 102-128. | |
[10] | MOREIRA L F R , MOREIRA R , TRAVENOLO B A N ,et al. An artificial intelligence-as-a-service architecture for deep learning model embodiment on low-cost devices:a case study of COVID-19 diagnosis[J]. Applied Soft Computing, 2023,134: 1-13. |
[11] | RIVEST R L . Cryptography and machine learning[C]// Advances in Cryptology. Berlin:Springer, 1993: 427-439. |
[12] | GOHR A . Improving attacks on round-reduced SPECK32/64 using deep learning[C]// Annual International Cryptology Conference. Cham:Springer, 2019: 150-179. |
[13] | YADAV T , KUMAR M . Differential-ML distinguisher:machine learning based generic extension for differential cryptanalysis[C]// International Conference on Cryptology and Information Security in Latin America. Cham:Springer, 2021: 191-212. |
[14] | BELLINI E , ROSSI M . Performance comparison between deep learning-based and conventional cryptographic distinguishers[C]// Proceedings of the 2021 Computing Conference. Cham:Springer, 2021: 681-701. |
[15] | JAIN A , KOHLI V , MISHRA G . Deep learning based differential distinguisher for lightweight block ciphers[J]. arXiv Preprint,arXiv:2112.05061, 2021. |
[16] | BAKSI A . Classical and physical security of symmetric key cryptographic algorithms[M]. Singapore: Springer, 2022. |
[17] | ZHANG L , WANG Z . Improving differential-neural distinguisher model for DES,chaskey,and PRESENT[J]. arXiv Preprint,arXiv:2204.06341, 2022. |
[18] | ZHANG L , LU J , WANG Z ,et al. Improved differential-neural cryptanalysis for round-reduced SIMECK32/64[J]. arXiv Preprint,arXiv:2301.11601, 2023. |
[19] | CHENG H , DING Q . Overview of the block cipher[C]// Proceedings of 2012 Second International Conference on Instrumentation,Measurement,Computer,Communication and Control. Piscataway:IEEE Press, 2013: 1628-1631. |
[20] | ZHANG L , ZHANG W T , WU W L . Cryptanalysis of reduced-round SMS4 block cipher[C]// Australasian Conference on Information Security and Privacy. Berlin:Springer, 2008: 216-229. |
[21] | SU B Z , WU W L , ZHANG W T . Security of the SMS4 block cipher against differential cryptanalysis[J]. Journal of Computer Science and Technology, 2011,26(1): 130-138. |
[22] | 潘印雪, 王高丽, 倪建强 . 基于MILP寻找SM4算法的差分特征[J]. 计算机研究与发展, 2022,59(10): 2299-2308. |
PAN Y X , WANG G L , NI J Q . Finding differential characteristics of SM4 algorithm based on MILP[J]. Journal of Computer Research and Development, 2022,59(10): 2299-2308. | |
[23] | 王敏, 吴震, 饶金涛 ,等. 针对 SM4 算法的约减轮故障攻击[J]. 通信学报, 2016,37(S1): 98-103. |
WANG M , WU Z , RAO J T ,et al. Round reduction-based fault attack on SM4 algorithm[J]. Journal on Communications, 2016,37(S1): 98-103. | |
[24] | BENAMIRA A , GERAULT D , PEYRIN T ,et al. A deeper look at machine learning-based cryptanalysis[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. Cham:Springer, 2021: 805-835. |
[25] | 余玥琳, 武小年, 张润莲 . 基于卷积残差网络的 SM4 算法分析[J]. 桂林电子科技大学学报, 2023,43(1): 75-79. |
YU Y L , WU X N , ZHANG R L . Cryptanalysis of SM4 algorithm based on convolutional residual networks[J]. Journal of Guilin University of Electronic Technology, 2023,43(1): 75-79. | |
[26] | GU J X , WANG Z H , KUEN J ,et al. Recent advances in convolutional neural networks[J]. Pattern Recognition, 2018,77: 354-377. |
[27] | HE K M , ZHANG X Y , REN S Q ,et al. Deep residual learning for image recognition[C]// Proceedings of 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Piscataway:IEEE Press, 2016: 770-778. |
[28] | 吴文玲, 冯登国, 张文涛 . 分组密码的设计与分析:第 2 版[M]. 北京: 清华大学出版社, 2009. |
WU W L , FENG D G , ZHANG W T . Design and analysis of Block cipher[M]. Beijing: Tsinghua University Press, 2009. | |
[29] | KINGMA D P , BA J . Adam:a method for stochastic optimization[J]. arXiv Preprint,arXiv:1412.6980, 2014. |
[30] | BAO Z , GUO J , LIU M ,et al. Conditional differential-neural cryptanalysis[J]. IACR Cryptology ePrint Archive,2021, 2021:719. |
[31] | TIAN W Q , HU B . Deep learning assisted differential cryptanalysis for the lightweight cipher SIMON[J]. KSII Transactions on Internet and Information Systems, 2021,15(2): 600-616. |
[1] | Shuai MA, Ke PEI, Huayan QI, Hang LI, Wen CAO, Hongmei WANG, Hailiang XIONG, Shiyin LI. Research on geomagnetic indoor high-precision positioning algorithm based on generative model [J]. Journal on Communications, 2023, 44(6): 211-222. |
[2] | Rongpeng LI, Bingyan WANG, Honggang ZHANG, Zhifeng ZHAO. Design of knowledge enhanced semantic communication receiver [J]. Journal on Communications, 2023, 44(6): 70-76. |
[3] | Dongyu CHEN, Hua CHEN, Limin FAN, Yifang FU, Jian WANG. Research on test strategy for randomness based on deep learning [J]. Journal on Communications, 2023, 44(6): 23-33. |
[4] | Ping ZHANG, Kai NIU, Shengshi YAO, Jincheng DAI. Semantic communications for future: basic principle and implementation methodology [J]. Journal on Communications, 2023, 44(5): 1-14. |
[5] | Shaoyu DU. Improved integral attack——random linear distinguish and key recovery attack [J]. Journal on Communications, 2023, 44(4): 145-153. |
[6] | Bin HU, Xiao TAN, Senpeng WANG. SAT-based differential automatic search algorithm using divide-and-conquer strategy and its applications [J]. Journal on Communications, 2023, 44(4): 137-144. |
[7] | Guang YANG, Zhaoyang WU, Min NIE, Xiaohong YAN, Fan JIANG. Research on PAPR reduction algorithm based on CWGAN-SLM for multi-wavelet OFDM system [J]. Journal on Communications, 2023, 44(4): 99-110. |
[8] | Xiaoyun WANG, Xiaozhou ZHANG, Liang MA, Yajuan WANG, Mengting LOU, Tao JIANG, Jing JIN, Qixing WANG, Guangyi LIU. Research and optimization on the sensing algorithm for 6G integrated sensing and communication network [J]. Journal on Communications, 2023, 44(2): 219-230. |
[9] | Zhengbin LIU, Yongqiang LI, Chaoxi ZHU. Fast algorithm to search for the minimum number of active S-boxes of block cipher [J]. Journal on Communications, 2023, 44(1): 118-128. |
[10] | Jie YANG, Biao DONG, Xue FU, Yu WANG, Guan GUI. Lightweight decentralized learning-based automatic modulation classification method [J]. Journal on Communications, 2022, 43(7): 134-142. |
[11] | Manman LI, Shaozhen CHEN. Improved meet-in-the-middle attack on reduced-round Kiasu-BC algorithm [J]. Journal on Communications, 2022, 43(7): 41-48. |
[12] | Xiuzhang YANG, Guojun PENG, Zichuan LI, Yangqi LYU, Side LIU, Chenguang LI. Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF [J]. Journal on Communications, 2022, 43(6): 58-70. |
[13] | Yurong LIAO, Haining WANG, Cunbao LIN, Yang LI, Yuqiang FANG, Shuyan NI. Research progress of deep learning-based object detection of optical remote sensing image [J]. Journal on Communications, 2022, 43(5): 190-203. |
[14] | Yong LIAO, Shiyi WANG. CSI feedback algorithm based on RM-Net for massive MIMO systems in high-speed mobile environment [J]. Journal on Communications, 2022, 43(5): 166-176. |
[15] | Zenghua ZHAO, Yuefan TONG, Jiayang CUI. Device-independent Wi-Fi fingerprinting indoor localization model based on domain adaptation [J]. Journal on Communications, 2022, 43(4): 143-153. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|