Netinfo Security ›› 2025, Vol. 25 ›› Issue (2): 249-259.doi: 10.3969/j.issn.1671-1122.2025.02.006

Previous Articles     Next Articles

Improved Neural Network Differential Distinguisher of Simon32/64 and Simeck32/64

WU Haoying1, CHEN Jie1,2(), LIU Jun3   

  1. 1. School of Telecommunications Engineering, Xidian University, Xi’an 710071, China
    2. Henan Key Laboratory of Network Cryptography Technology, Zhengzhou 450001, China
    3. School of Computer Science, Shaanxi Normal University, Xi’an 710119, China
  • Received:2024-05-22 Online:2025-02-10 Published:2025-03-07

Abstract:

Neural distinguishers have good generalisation ability as well as powerful learning ability, but there is still a lack of perfect and universal neural network distinguishing model. In order to increase the accuracy of the neural distinguishers of Simon32/64 and Simeck32/64, increase the generalizability of the neural differential distinguishers, this paper proposed three improvement directions. First, multiple ciphertext pairs were used as inputs to the Simon32/64 and Simeck32/64 neural distinguishers, and the Inception network module was added to the neural network model to improve the overfitting phenomenon. Then, added Simon32/64 and Simeck32/64 penultimate round difference information to the multi-ciphertext pair input samples, constructed the netural distinguishers of 7 to 10 rounds of Simon32/64 and 7 to 11 rounds of Simeck32/64. Finelly, multiple ciphertext pairs were combined with polyhedral difference, constructed polyhedral differential distinguishers for Simon32/64 and Simeck32/64. The accuracy of the polyhedral neural distinguishers were improved. The experimental results show that the new polyhedral netural distinguishers of 8-round of Simon32/64 reach the accuracy of 99.54% and 8-round of Simeck32/64 reach the accuracy of 99.67%. In addition, the improved netural distinguishers of the 10-round of Simon32/64 and Simeck32/64 are applied to the final round of key recovery attacks of 12-round of Simon32/64 and Simeck32/64, the success rate of the attacks respectively reaches 86% and 97% in 100 attack experiments.

Key words: deep learning, Inception module, multiple ciphertext pairs, polyhedral difference, key recovery attack

CLC Number: