对基于深度学习的密钥恢复攻击的分析与改进
在 2019 年美密会议上, Gohr 提出了第一个基于深度学习的密钥恢复攻击, 并应用于 11 轮、12 轮 Speck32/64. 本文从时间复杂度的角度对该攻击进行分析和改进. 发现 Gohr 所提攻击的运行时间主要受解密、访问神经区分器、通过贝叶斯优化推荐密钥等三个操作的影响, 后两个操作几乎占据了全部运行时间; Gohr 采用的强化学习机制导致错误密文结构占据了过多计算资源. 提出了以下改进: (1) 攻击只采用在部分密文比特上建立的神经区分器, 并用查找表代替神经区分器, 使得攻击运行时可以完全摆脱对神经网络的依赖. (2) 放弃强化学习机制, 使用新的 ``Guess-and-F...
Saved in:
| Published in | Journal of Cryptologic Research Vol. 10; no. 1; p. 168 |
|---|---|
| Main Authors | , , , , , |
| Format | Journal Article |
| Language | Chinese |
| Published |
Beijing
Chinese Association for Cryptologic Research, Journal of Cryptologic Research
01.02.2023
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 2097-4116 |
| DOI | 10.13868/j.cnki.jcr.000587 |
Cover
| Abstract | 在 2019 年美密会议上, Gohr 提出了第一个基于深度学习的密钥恢复攻击, 并应用于 11 轮、12 轮 Speck32/64. 本文从时间复杂度的角度对该攻击进行分析和改进. 发现 Gohr 所提攻击的运行时间主要受解密、访问神经区分器、通过贝叶斯优化推荐密钥等三个操作的影响, 后两个操作几乎占据了全部运行时间; Gohr 采用的强化学习机制导致错误密文结构占据了过多计算资源. 提出了以下改进: (1) 攻击只采用在部分密文比特上建立的神经区分器, 并用查找表代替神经区分器, 使得攻击运行时可以完全摆脱对神经网络的依赖. (2) 放弃强化学习机制, 使用新的 ``Guess-and-Filter'' 策略. 通过贝叶斯优化推荐部分密钥的思想和 ``Guess-and-Filter'' 策略有冲突, 所以也放弃使用贝叶斯优化. 基于上述改进, 提出了新的密钥恢复攻击, 使得时间复杂度显著降低. 为了验证新的密钥恢复攻击在时间复杂度上的优势, 在11 轮、12 轮 Speck32/64 上进行了实际密钥恢复攻击, 时间复杂度分别为 226.68 和 232.25. 与已有的最优攻击相比, 复杂度分别减少为原来的 1/211.32 和 1/211.1. 此前没有研究从运行时间角度分析对基于深度学习的密钥恢复攻击, 本文工作有助于推动基于深度学习的密码分析的研究. |
|---|---|
| AbstractList | 在 2019 年美密会议上, Gohr 提出了第一个基于深度学习的密钥恢复攻击, 并应用于 11 轮、12 轮 Speck32/64. 本文从时间复杂度的角度对该攻击进行分析和改进. 发现 Gohr 所提攻击的运行时间主要受解密、访问神经区分器、通过贝叶斯优化推荐密钥等三个操作的影响, 后两个操作几乎占据了全部运行时间; Gohr 采用的强化学习机制导致错误密文结构占据了过多计算资源. 提出了以下改进: (1) 攻击只采用在部分密文比特上建立的神经区分器, 并用查找表代替神经区分器, 使得攻击运行时可以完全摆脱对神经网络的依赖. (2) 放弃强化学习机制, 使用新的 ``Guess-and-Filter'' 策略. 通过贝叶斯优化推荐部分密钥的思想和 ``Guess-and-Filter'' 策略有冲突, 所以也放弃使用贝叶斯优化. 基于上述改进, 提出了新的密钥恢复攻击, 使得时间复杂度显著降低. 为了验证新的密钥恢复攻击在时间复杂度上的优势, 在11 轮、12 轮 Speck32/64 上进行了实际密钥恢复攻击, 时间复杂度分别为 226.68 和 232.25. 与已有的最优攻击相比, 复杂度分别减少为原来的 1/211.32 和 1/211.1. 此前没有研究从运行时间角度分析对基于深度学习的密钥恢复攻击, 本文工作有助于推动基于深度学习的密码分析的研究. |
| Author | 于红波 Yan-Tian, SHEN 陈怡 申焱天 Hong-Bo, YU CHEN, Yi |
| Author_xml | – sequence: 1 givenname: Yi surname: CHEN fullname: CHEN, Yi – sequence: 2 givenname: SHEN surname: Yan-Tian fullname: Yan-Tian, SHEN – sequence: 3 givenname: YU surname: Hong-Bo fullname: Hong-Bo, YU – sequence: 4 fullname: 陈怡 – sequence: 5 fullname: 申焱天 – sequence: 6 fullname: 于红波 |
| BookMark | eNotjT9Lw0AcQG-oYK39Aq7Oife7y_0JuEjxHxRcdC6XywVaJamJ_QCCVBeLlE4KKqLdpDhp0sEvk4v6LVR0evCG95ZQLU5ig9AKYBeo5HKt5-r4sOv2dOpijJkUNVQn2BeOB8AXUTPLugFmjFNJPKijdTvL7V1RFqPq9cUWU_s8LfP7j-szOxt-jZ-q0wf7eFlN5vZ8_isvhtXtVfk2qib55_vNMlqI1FFmmv9soIOtzf3WjtPe295tbbSdPhBJHK4FCxlTIfZJYDA1HoRYaQlcay2MjDwFoPyA6Ag4ZxAwbIjAxKjA434U0QZa_ev20-R4YLKTTi8ZpPHPskOkkMCAAqHfGZ1hKA |
| ContentType | Journal Article |
| Copyright | 2023. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: 2023. This work is published under http://www.jcr.cacrnet.org.cn/EN/column/column4.shtml Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | 8FE 8FG ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS |
| DOI | 10.13868/j.cnki.jcr.000587 |
| DatabaseName | ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) ProQuest Central Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China |
| DatabaseTitle | Publicly Available Content Database Advanced Technologies & Aerospace Collection Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central China ProQuest Central Advanced Technologies & Aerospace Database ProQuest One Applied & Life Sciences ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| GroupedDBID | -SI -S~ 8FE 8FG ABUWG AFKRA ALMA_UNASSIGNED_HOLDINGS ARAPS AZQEC BENPR BGLVJ CAJEI CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- P62 PB1 PB9 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q-- |
| ID | FETCH-LOGICAL-p1282-6c75d55ad092be03e41d0ac816ccc7e8f4a11a9b2cf16651b50e2702eab469ff3 |
| IEDL.DBID | BENPR |
| ISSN | 2097-4116 |
| IngestDate | Mon Jun 30 15:07:10 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 1 |
| Language | Chinese |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-p1282-6c75d55ad092be03e41d0ac816ccc7e8f4a11a9b2cf16651b50e2702eab469ff3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| OpenAccessLink | https://www.proquest.com/docview/2878151312?pq-origsite=%requestingapplication%&accountid=15518 |
| PQID | 2878151312 |
| PQPubID | 6503834 |
| ParticipantIDs | proquest_journals_2878151312 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-02-01 |
| PublicationDateYYYYMMDD | 2023-02-01 |
| PublicationDate_xml | – month: 02 year: 2023 text: 2023-02-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Beijing |
| PublicationPlace_xml | – name: Beijing |
| PublicationTitle | Journal of Cryptologic Research |
| PublicationYear | 2023 |
| Publisher | Chinese Association for Cryptologic Research, Journal of Cryptologic Research |
| Publisher_xml | – name: Chinese Association for Cryptologic Research, Journal of Cryptologic Research |
| SSID | ssib055638241 ssib058688234 |
| Score | 2.334023 |
| Snippet | 在 2019 年美密会议上, Gohr 提出了第一个基于深度学习的密钥恢复攻击, 并应用于 11 轮、12 轮 Speck32/64. 本文从时间复杂度的角度对该攻击进行分析和改进. 发现 Gohr 所... |
| SourceID | proquest |
| SourceType | Aggregation Database |
| StartPage | 168 |
| SubjectTerms | Algorithms Bayesian analysis Complexity Deep learning Encryption Lookup tables Optimization Recovery |
| Title | 对基于深度学习的密钥恢复攻击的分析与改进 |
| URI | https://www.proquest.com/docview/2878151312 |
| Volume | 10 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: ProQuest Central issn: 2097-4116 databaseCode: BENPR dateStart: 20140101 customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.proquest.com/central omitProxy: true ssIdentifier: ssib055638241 providerName: ProQuest |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwY2BQSTROMbEwsTTRTTSyNNU1STJP0bUwtUzRNbM0T0oD1lep5uCJdl8_M49QE68I0wgmBj_YXhjQskpYmQguqFPyk0Fj5PrAlr0FsHYyNjSyLyjUBd0aBZpdhV2hkQi9WiHFFnzEGDMDqxHoZCwWBlYnV7-AIFgKA52GZWGEaACYWpgBW5jgqWcjA0tzXRNDQzPozhpjoJR-ll5yXnamXlZyEeicQ1MLc4wSG1wNuQky8EPbjwqOkAgXYmCqyhBhsHm6fufT-bue7Op7tn3j013Lnq5d9mTnguezWp6ub3s5aemzxkVPl_Q-m7L7aftukGBH27N5E57s6Hs2ZeeL_bNFGULdXEOcPXSh1yLoFgArEyNds2Rz0xRT08QUA0ujpFQD41QTwxSDxGQLQ7Pk5GTzVIs0k0RDw0TLJKPkNEMzM1PDJFODVNCus9TEJGBfOC3NWIyBJS8_L1WCQSEFWEOam6WamSZZpplYJKdagg58N0q2sEg0SAW2PBIlGWRg3o2Hpu3ieERMSOGXlmbgAl3ODlnjLMPAUlJUmioLrMJLkuQYmC3c3OWgsQMALh-vQQ |
| linkProvider | ProQuest |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwY2BQSTROMbEwsTTRTTSyNNU1STJP0bUwtUzRNbM0T0oD1lep5uCJdl8_M49QE68I0wgmhn2wvTCgZZWwMhFcUKfkJ4PGyPWBLXsLYO1kbGhkX1CoC7o1CjS7CrtCIxF6tUKKLfiIMejGDu_UynJgF67Y1tMFGN-qRkZuriHOHrrQWwZ0C4Bls5GuWbK5aYqpaWKKgaVRUqqBcaqJYYpBYrKFoVlycrJ5qkWaSaKhYaJlklFymqGZmalhkqlBKmgTV2piErBrmZZmDDSXmYHVxNjEEtj5Y3Vy9QsIgqVo0OlbFkaIBoephRmwRQue6jYysDTXNTE0NIPu5DEGSuln6SXnZWfqZSUXgc5VNLUwx6ghwNWemyADP7S9quAISWBCDExVGSIMNk_X73w6f9eTXX3Ptm98umvZ07XLnuxc8HxWy9P1bS8nLX3WuOjpkt5nU3Y_bd8NEuxoezZvwpMdfc-m7Hyxf7YoQyhNAkiMgSUvPy9VgkEhBVgjm5ulmpkmWaaZWCSnWoIOmDdKtrBINEgFtnQSJRlkYN6Nh-al4nhEzEvhl5Zn4PQI8fWJ9_H085Zm4AJdDA9ZXy3DwFJSVJoqC2w-lCTJQeNIgSGB1skCAGYr66M |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E5%AF%B9%E5%9F%BA%E4%BA%8E%E6%B7%B1%E5%BA%A6%E5%AD%A6%E4%B9%A0%E7%9A%84%E5%AF%86%E9%92%A5%E6%81%A2%E5%A4%8D%E6%94%BB%E5%87%BB%E7%9A%84%E5%88%86%E6%9E%90%E4%B8%8E%E6%94%B9%E8%BF%9B&rft.jtitle=Journal+of+Cryptologic+Research&rft.au=CHEN%2C+Yi&rft.au=Yan-Tian%2C+SHEN&rft.au=Hong-Bo%2C+YU&rft.au=%E9%99%88%E6%80%A1&rft.date=2023-02-01&rft.pub=Chinese+Association+for+Cryptologic+Research%2C+Journal+of+Cryptologic+Research&rft.issn=2097-4116&rft.volume=10&rft.issue=1&rft.spage=168&rft_id=info:doi/10.13868%2Fj.cnki.jcr.000587 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2097-4116&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2097-4116&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2097-4116&client=summon |