Enhancing Deep Learning-Based Rotational-XOR Attacks on Lightweight Block Ciphers Simon32/64 and Simeck32/64

πŸ“… 2025-11-09
πŸ“ˆ Citations: 0
✨ Influential: 0
πŸ“„ PDF
πŸ€– AI Summary
This work addresses the lightweight block ciphers Simon32/64 and Simeck32/64, tackling the challenge of constructing deep-learning-based distinguishers under rotation-XOR (RX) differentials. Methodologically, we propose an optimization framework for RX neural distinguishers, featuring a dedicated binary data representation, bit-sensitivity-based input compression, key-bit sensitivity analysis, a joint erroneous-key response mechanism, and Bayesian key recovery integration. Our approach innovatively overcomes the bottleneck of related-key attacks under nonlinear key schedules. As a result, we construct RX neural distinguishers for 14 rounds of Simon32/64 and 17 rounds of Simeck32/64β€”improving upon prior results by 3 and 2 rounds, respectively. Moreover, we achieve the first practical key-recovery attack on 17-round Simeck32/64, significantly extending the practical applicability boundary of deep learning in lightweight cryptanalysis.

Technology Category

Application Category

πŸ“ Abstract
At CRYPTO 2019, Gohr pioneered neural cryptanalysis by introducing differential-based neural distinguishers to attack Speck32/64, establishing a novel paradigm combining deep learning with differential cryptanalysis.Since then, constructing neural distinguishers has become a significant approach to achieving the deep learning-based cryptanalysis for block ciphers.This paper advances rotational-XOR (RX) attacks through neural networks, focusing on optimizing distinguishers and presenting key-recovery attacks for the lightweight block ciphers Simon32/64 and Simeck32/64.In particular, we first construct the fundamental data formats specially designed for training RX-neural distinguishers by refining the existing data formats for differential-neural distinguishers. Based on these data formats, we systematically identify optimal RX-differences with Hamming weights 1 and 2 that develop high-accuracy RX-neural distinguishers. Then, through innovative application of the bit sensitivity test, we achieve significant compression of data format without sacrificing the distinguisher accuracy. This optimization enables us to add more multi-ciphertext pairs into the data formats, further strengthening the performance of RX-neural distinguishers. As an application, we obtain 14- and 17-round RX-neural distinguishers for Simon32/64 and Simeck32/64, which improves the previous ones by 3 and 2 rounds, respectively.In addition, we propose two novel techniques, key bit sensitivity test and the joint wrong key response, to tackle the challenge of applying Bayesian's key-recovery strategy to the target cipher that adopts nonlinear key schedule in the related-key setting without considering of weak-key space. By this, we can straightforwardly mount a 17-round key-recovery attack on Simeck32/64 based on the improved 16-round RX-nerual distinguisher. To the best of our knowledge, the presented RX-neural......
Problem

Research questions and friction points this paper is trying to address.

Advancing rotational-XOR attacks using neural networks on lightweight ciphers
Optimizing neural distinguishers for Simon32/64 and Simeck32/64 block ciphers
Developing key-recovery attacks against ciphers with nonlinear key schedules
Innovation

Methods, ideas, or system contributions that make the work stand out.

Constructs rotational-XOR neural distinguishers for lightweight ciphers
Compresses data formats using bit sensitivity test optimization
Introduces key bit sensitivity test for Bayesian key-recovery
πŸ”Ž Similar Papers
No similar papers found.