对基于深度学习的密钥恢复攻击的分析与改进

在 2019 年美密会议上, Gohr 提出了第一个基于深度学习的密钥恢复攻击, 并应用于 11 轮、12 轮 Speck32/64. 本文从时间复杂度的角度对该攻击进行分析和改进. 发现 Gohr 所提攻击的运行时间主要受解密、访问神经区分器、通过贝叶斯优化推荐密钥等三个操作的影响, 后两个操作几乎占据了全部运行时间; Gohr 采用的强化学习机制导致错误密文结构占据了过多计算资源. 提出了以下改进: (1) 攻击只采用在部分密文比特上建立的神经区分器, 并用查找表代替神经区分器, 使得攻击运行时可以完全摆脱对神经网络的依赖. (2) 放弃强化学习机制, 使用新的 ``Guess-and-F...

Full description

Saved in:
Bibliographic Details
Published inJournal of Cryptologic Research Vol. 10; no. 1; p. 168
Main Authors CHEN, Yi, Yan-Tian, SHEN, Hong-Bo, YU, 陈怡, 申焱天, 于红波
Format Journal Article
LanguageChinese
Published Beijing Chinese Association for Cryptologic Research, Journal of Cryptologic Research 01.02.2023
Subjects
Online AccessGet full text
ISSN2097-4116
DOI10.13868/j.cnki.jcr.000587

Cover

Abstract 在 2019 年美密会议上, Gohr 提出了第一个基于深度学习的密钥恢复攻击, 并应用于 11 轮、12 轮 Speck32/64. 本文从时间复杂度的角度对该攻击进行分析和改进. 发现 Gohr 所提攻击的运行时间主要受解密、访问神经区分器、通过贝叶斯优化推荐密钥等三个操作的影响, 后两个操作几乎占据了全部运行时间; Gohr 采用的强化学习机制导致错误密文结构占据了过多计算资源. 提出了以下改进: (1) 攻击只采用在部分密文比特上建立的神经区分器, 并用查找表代替神经区分器, 使得攻击运行时可以完全摆脱对神经网络的依赖. (2) 放弃强化学习机制, 使用新的 ``Guess-and-Filter'' 策略. 通过贝叶斯优化推荐部分密钥的思想和 ``Guess-and-Filter'' 策略有冲突, 所以也放弃使用贝叶斯优化. 基于上述改进, 提出了新的密钥恢复攻击, 使得时间复杂度显著降低. 为了验证新的密钥恢复攻击在时间复杂度上的优势, 在11 轮、12 轮 Speck32/64 上进行了实际密钥恢复攻击, 时间复杂度分别为 226.68 和 232.25. 与已有的最优攻击相比, 复杂度分别减少为原来的 1/211.32 和 1/211.1. 此前没有研究从运行时间角度分析对基于深度学习的密钥恢复攻击, 本文工作有助于推动基于深度学习的密码分析的研究.
AbstractList 在 2019 年美密会议上, Gohr 提出了第一个基于深度学习的密钥恢复攻击, 并应用于 11 轮、12 轮 Speck32/64. 本文从时间复杂度的角度对该攻击进行分析和改进. 发现 Gohr 所提攻击的运行时间主要受解密、访问神经区分器、通过贝叶斯优化推荐密钥等三个操作的影响, 后两个操作几乎占据了全部运行时间; Gohr 采用的强化学习机制导致错误密文结构占据了过多计算资源. 提出了以下改进: (1) 攻击只采用在部分密文比特上建立的神经区分器, 并用查找表代替神经区分器, 使得攻击运行时可以完全摆脱对神经网络的依赖. (2) 放弃强化学习机制, 使用新的 ``Guess-and-Filter'' 策略. 通过贝叶斯优化推荐部分密钥的思想和 ``Guess-and-Filter'' 策略有冲突, 所以也放弃使用贝叶斯优化. 基于上述改进, 提出了新的密钥恢复攻击, 使得时间复杂度显著降低. 为了验证新的密钥恢复攻击在时间复杂度上的优势, 在11 轮、12 轮 Speck32/64 上进行了实际密钥恢复攻击, 时间复杂度分别为 226.68 和 232.25. 与已有的最优攻击相比, 复杂度分别减少为原来的 1/211.32 和 1/211.1. 此前没有研究从运行时间角度分析对基于深度学习的密钥恢复攻击, 本文工作有助于推动基于深度学习的密码分析的研究.
Author 于红波
Yan-Tian, SHEN
陈怡
申焱天
Hong-Bo, YU
CHEN, Yi
Author_xml – sequence: 1
  givenname: Yi
  surname: CHEN
  fullname: CHEN, Yi
– sequence: 2
  givenname: SHEN
  surname: Yan-Tian
  fullname: Yan-Tian, SHEN
– sequence: 3
  givenname: YU
  surname: Hong-Bo
  fullname: Hong-Bo, YU
– sequence: 4
  fullname: 陈怡
– sequence: 5
  fullname: 申焱天
– sequence: 6
  fullname: 于红波
BookMark eNotjT9Lw0AcQG-oYK39Aq7Oife7y_0JuEjxHxRcdC6XywVaJamJ_QCCVBeLlE4KKqLdpDhp0sEvk4v6LVR0evCG95ZQLU5ig9AKYBeo5HKt5-r4sOv2dOpijJkUNVQn2BeOB8AXUTPLugFmjFNJPKijdTvL7V1RFqPq9cUWU_s8LfP7j-szOxt-jZ-q0wf7eFlN5vZ8_isvhtXtVfk2qib55_vNMlqI1FFmmv9soIOtzf3WjtPe295tbbSdPhBJHK4FCxlTIfZJYDA1HoRYaQlcay2MjDwFoPyA6Ag4ZxAwbIjAxKjA434U0QZa_ev20-R4YLKTTi8ZpPHPskOkkMCAAqHfGZ1hKA
ContentType Journal Article
Copyright 2023. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2023. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID 8FE
8FG
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
DOI 10.13868/j.cnki.jcr.000587
DatabaseName ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni)
ProQuest Central
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
DatabaseTitle Publicly Available Content Database
Advanced Technologies & Aerospace Collection
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central China
ProQuest Central
Advanced Technologies & Aerospace Database
ProQuest One Applied & Life Sciences
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList Publicly Available Content Database
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
GroupedDBID -SI
-S~
8FE
8FG
ABUWG
AFKRA
ALMA_UNASSIGNED_HOLDINGS
ARAPS
AZQEC
BENPR
BGLVJ
CAJEI
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
P62
PB1
PB9
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q--
ID FETCH-LOGICAL-p1282-6c75d55ad092be03e41d0ac816ccc7e8f4a11a9b2cf16651b50e2702eab469ff3
IEDL.DBID BENPR
ISSN 2097-4116
IngestDate Mon Jun 30 15:07:10 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Issue 1
Language Chinese
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-p1282-6c75d55ad092be03e41d0ac816ccc7e8f4a11a9b2cf16651b50e2702eab469ff3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
OpenAccessLink https://www.proquest.com/docview/2878151312?pq-origsite=%requestingapplication%&accountid=15518
PQID 2878151312
PQPubID 6503834
ParticipantIDs proquest_journals_2878151312
PublicationCentury 2000
PublicationDate 2023-02-01
PublicationDateYYYYMMDD 2023-02-01
PublicationDate_xml – month: 02
  year: 2023
  text: 2023-02-01
  day: 01
PublicationDecade 2020
PublicationPlace Beijing
PublicationPlace_xml – name: Beijing
PublicationTitle Journal of Cryptologic Research
PublicationYear 2023
Publisher Chinese Association for Cryptologic Research, Journal of Cryptologic Research
Publisher_xml – name: Chinese Association for Cryptologic Research, Journal of Cryptologic Research
SSID ssib055638241
ssib058688234
Score 2.334023
Snippet 在 2019 年美密会议上, Gohr 提出了第一个基于深度学习的密钥恢复攻击, 并应用于 11 轮、12 轮 Speck32/64. 本文从时间复杂度的角度对该攻击进行分析和改进. 发现 Gohr 所...
SourceID proquest
SourceType Aggregation Database
StartPage 168
SubjectTerms Algorithms
Bayesian analysis
Complexity
Deep learning
Encryption
Lookup tables
Optimization
Recovery
Title 对基于深度学习的密钥恢复攻击的分析与改进
URI https://www.proquest.com/docview/2878151312
Volume 10
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: ProQuest Central
  issn: 2097-4116
  databaseCode: BENPR
  dateStart: 20140101
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.proquest.com/central
  omitProxy: true
  ssIdentifier: ssib055638241
  providerName: ProQuest
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwY2BQSTROMbEwsTTRTTSyNNU1STJP0bUwtUzRNbM0T0oD1lep5uCJdl8_M49QE68I0wgmBj_YXhjQskpYmQguqFPyk0Fj5PrAlr0FsHYyNjSyLyjUBd0aBZpdhV2hkQi9WiHFFnzEGDMDqxHoZCwWBlYnV7-AIFgKA52GZWGEaACYWpgBW5jgqWcjA0tzXRNDQzPozhpjoJR-ll5yXnamXlZyEeicQ1MLc4wSG1wNuQky8EPbjwqOkAgXYmCqyhBhsHm6fufT-bue7Op7tn3j013Lnq5d9mTnguezWp6ub3s5aemzxkVPl_Q-m7L7aftukGBH27N5E57s6Hs2ZeeL_bNFGULdXEOcPXSh1yLoFgArEyNds2Rz0xRT08QUA0ujpFQD41QTwxSDxGQLQ7Pk5GTzVIs0k0RDw0TLJKPkNEMzM1PDJFODVNCus9TEJGBfOC3NWIyBJS8_L1WCQSEFWEOam6WamSZZpplYJKdagg58N0q2sEg0SAW2PBIlGWRg3o2Hpu3ieERMSOGXlmbgAl3ODlnjLMPAUlJUmioLrMJLkuQYmC3c3OWgsQMALh-vQQ
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwY2BQSTROMbEwsTTRTTSyNNU1STJP0bUwtUzRNbM0T0oD1lep5uCJdl8_M49QE68I0wgmhn2wvTCgZZWwMhFcUKfkJ4PGyPWBLXsLYO1kbGhkX1CoC7o1CjS7CrtCIxF6tUKKLfiIMejGDu_UynJgF67Y1tMFGN-qRkZuriHOHrrQWwZ0C4Bls5GuWbK5aYqpaWKKgaVRUqqBcaqJYYpBYrKFoVlycrJ5qkWaSaKhYaJlklFymqGZmalhkqlBKmgTV2piErBrmZZmDDSXmYHVxNjEEtj5Y3Vy9QsIgqVo0OlbFkaIBoephRmwRQue6jYysDTXNTE0NIPu5DEGSuln6SXnZWfqZSUXgc5VNLUwx6ghwNWemyADP7S9quAISWBCDExVGSIMNk_X73w6f9eTXX3Ptm98umvZ07XLnuxc8HxWy9P1bS8nLX3WuOjpkt5nU3Y_bd8NEuxoezZvwpMdfc-m7Hyxf7YoQyhNAkiMgSUvPy9VgkEhBVgjm5ulmpkmWaaZWCSnWoIOmDdKtrBINEgFtnQSJRlkYN6Nh-al4nhEzEvhl5Zn4PQI8fWJ9_H085Zm4AJdDA9ZXy3DwFJSVJoqC2w-lCTJQeNIgSGB1skCAGYr66M
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E5%AF%B9%E5%9F%BA%E4%BA%8E%E6%B7%B1%E5%BA%A6%E5%AD%A6%E4%B9%A0%E7%9A%84%E5%AF%86%E9%92%A5%E6%81%A2%E5%A4%8D%E6%94%BB%E5%87%BB%E7%9A%84%E5%88%86%E6%9E%90%E4%B8%8E%E6%94%B9%E8%BF%9B&rft.jtitle=Journal+of+Cryptologic+Research&rft.au=CHEN%2C+Yi&rft.au=Yan-Tian%2C+SHEN&rft.au=Hong-Bo%2C+YU&rft.au=%E9%99%88%E6%80%A1&rft.date=2023-02-01&rft.pub=Chinese+Association+for+Cryptologic+Research%2C+Journal+of+Cryptologic+Research&rft.issn=2097-4116&rft.volume=10&rft.issue=1&rft.spage=168&rft_id=info:doi/10.13868%2Fj.cnki.jcr.000587
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2097-4116&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2097-4116&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2097-4116&client=summon