• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Huijiao, Cong Peng, Jiang Hua, Wei Yongzhuang. Security Analysis of SIMON32/64 Based on Deep Learning[J]. Journal of Computer Research and Development, 2021, 58(5): 1056-1064. DOI: 10.7544/issn1000-1239.2021.20200900
Citation: Wang Huijiao, Cong Peng, Jiang Hua, Wei Yongzhuang. Security Analysis of SIMON32/64 Based on Deep Learning[J]. Journal of Computer Research and Development, 2021, 58(5): 1056-1064. DOI: 10.7544/issn1000-1239.2021.20200900

Security Analysis of SIMON32/64 Based on Deep Learning

Funds: This work was supported by the Guangxi Natural Science Foundation (2019GXNSFGA245004), the Science and Technology Major Project of Guangxi (Guike AA18118025), and the Project of Guangxi Key Laboratory of Trusted Software (KX202056).
More Information
  • Published Date: April 30, 2021
  • With the rapid development of the Internet of Things, lightweight block cipher provides a solid foundation for the data security in various resource constrained environments. Currently, the security analysis of lightweight block ciphers tends to be more and more automated and intelligent. Applying deep learning to analyze the security of lightweight block ciphers appears to be a new research hotspot in this area. In this paper, the neural network technology is used to the security analysis of SIMON32/64, a lightweight block cipher algorithm released by the National Security Agency (NSA) in 2013. The feedforward neural network and the convolutional neural network are used to simulate the case of single input differential to multi output differential in multi differential cryptanalysis. Some deep learning distinguishers of 6-round (or even 9-round) reduced SIMON32/64 are designed, and both the advantages and disadvantages of the two neural network structures under different conditions are investigated. A candidate key sieving method for the 9-round reduced SIMON32/64 is also presented by extending the 7-round distinguisher of the feed-forward and the convolution neural networks, where one round forward and one round backward of this 7-round distinguisher are respectively considered. The experimental results show that 65535 candidate keys were dramatically reduced to 675 by only using 128 chosen plaintext pairs. Compared with the traditional differential distinguishers of reduced SIMON32/64, the new distinguishers combined with deep learning notably reduce both the time complexity and data complexity.
  • Related Articles

    [1]Zhang Xiaojian, Zhang Leilei, Zhang Zhizheng. Federated Learning Method Under User-Level Local Differential Privacy[J]. Journal of Computer Research and Development, 2025, 62(2): 472-487. DOI: 10.7544/issn1000-1239.202330167
    [2]Feng Xinyue, Yang Qiusong, Shi Lin, Wang Qing, Li Mingshu. Critical Memory Data Access Monitor Based on Dynamic Strategy Learning[J]. Journal of Computer Research and Development, 2019, 56(7): 1470-1487. DOI: 10.7544/issn1000-1239.2019.20180577
    [3]Yang Yatao, Zhang Yaze, Li Zichen, Zhang Fengjuan, Liu Boya. RAKA: New Authenticated Key Agreement Protocol Based on Ring-LWE[J]. Journal of Computer Research and Development, 2017, 54(10): 2187-2192. DOI: 10.7544/issn1000-1239.2017.20170477
    [4]HePan, TanChun, YuanYue, WuKaigui. Optimal Resources Allocation Algorithm for Optional Redundancy and Monitoring Strategies[J]. Journal of Computer Research and Development, 2016, 53(3): 682-696. DOI: 10.7544/issn1000-1239.2016.20148204
    [5]Peng Hu, Wu Zhijian, Zhou Xinyu, Deng Changshou. Bare-Bones Differential Evolution Algorithm Based on Trigonometry[J]. Journal of Computer Research and Development, 2015, 52(12): 2776-2788. DOI: 10.7544/issn1000-1239.2015.20140230
    [6]Fu Lingxiao, Peng Xin, and Zhao Wenyun. An Agent-Based Requirements Monitoring Framework for Internetware[J]. Journal of Computer Research and Development, 2013, 50(5): 1055-1065.
    [7]Zhu Jun, Guo Changguo, Wu Quanyuan. A Runtime Monitoring Web Services Interaction Behaviors Method Based on CPN[J]. Journal of Computer Research and Development, 2011, 48(12): 2277-2289.
    [8]Lu Zhaoxia, Zeng Guangzhou. A Cooperative Monitoring Model of Migrating Workflow[J]. Journal of Computer Research and Development, 2009, 46(3): 398-406.
    [9]Xu Jian, Zhang Kun, Liu Fengyu, Xu Manwu. An Approach to Immunity-Based Performance Monitoring and Evaluation for Computing Systems[J]. Journal of Computer Research and Development, 2007, 44(3).
    [10]Yu Wanjun, Liu Dayou, Liu Quan, Yang Bo. An Approach to Monitoring and Controlling Workflow Systems Based on the Instance State[J]. Journal of Computer Research and Development, 2006, 43(8): 1345-1353.

Catalog

    Article views PDF downloads Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return