Computer Science ›› 2026, Vol. 53 ›› Issue (3): 453-458.doi: 10.11896/jsjkx.250600176

• Information Security • Previous Articles     Next Articles

Deep Learning-based Neural Differential Distinguishers for GIFT-128 and ASCON

SU Ruitao, REN Jiongjiong, CHEN Shaozhen   

  1. Information Engineering University, Zhengzhou 450001, China
  • Received:2025-06-24 Revised:2025-10-25 Published:2026-03-12
  • About author:SU Ruitao,born in 2001,postgraduate.His main research interest is analysis of block ciphers.
    REN Jiongjiong,born in 1995,Ph.D.His main research interest is analysis of block ciphers.
  • Supported by:
    National Natural Science Foundation of China(62206312).

Abstract: As a critical method for block cipher security evaluation,differential cryptanalysis distinguishes ciphers from random permutations by analyzing plaintext difference propagation during encryption.Traditional approaches struggle with complex cryptographic algorithms,while deep learning offers new cryptanalysis perspectives increasingly applied in recent years.To enhance the security evaluation of block ciphers,this paper proposes a neural differential distinguisher construction method that integrates traditional differential analysis with deep learning.For dataset construction,a triplet input format comprising multiple ciphertext pairs is adopted to preserve differential characteristics and capture cross-ciphertext-pair correlations.The network architecture builds upon Convolutional Neural Networks(CNNs) and incorporates residual shrinkage networks to form a deep expansion structure with a multi-scale feature fusion mechanism.Experiments on GIFT-128 and ASCON-PERMUTATION demonstrate significant improvements:For GIFT-128,the highest accuracy of 6-round and 7-round distinguishers reaches 99.70%(an improvement of 9.30%) and 95.47%(an improvement of 13.09%),respectively.For the 4-round analysis of ASCON,the highest accuracy achieves 53.54%.These results validate the effectiveness of the deep learning approach in cryptographic security analysis.

Key words: Deep learning, Differential cryptanalysis, Block cipher, Neutral distinguisher, GIFT-128, ASCON

CLC Number: 

  • TN918
[1]BIHAM E,SHAMIR A.Differential cryptanalysis of DES-like cryptosystems[J].Journal of Cryptology,1991,4:3-72.
[2]LAI X J.Higher order derivatives and differential cryptanalysis[C]//Proceeding of the Symposium on Communication,Coding and Cryptography.Springer,1994:10-13.
[3]BIHAM E,BIRYUKOV A,SHAMIR A.Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials[C]//Advances in Cryptology—EUROCRYPT’99.Berlin:Springer,1999:12-23.
[4]BIHAM E.New types of cryptanalytic attacks using relatedkeys[J].Journal of Cryptology,1994,7:229-246.
[5]GOHR A.Improving attacks on round-reduced speck32/64using deep learning[C]//Advances in Cryptology-CRYPTO 2019.2019:150-179.
[6]CHEN Y,YU H.A New Neural Distinguisher Model Considering Derived Features from Multiple Ciphertext Pairs[J].The Computer Journal,2023,66(6):1419-1433.
[7]HOU Z,REN J,CHEN S.Improve neural distinguisher forcryptanalysis[EB/OL].https://eprint.iacr.org/2021/1017.
[8]LU J,LIU G,SUN B,et al.Improved(related-key) differential-based neural distinguishers for SIMON and SIMECK block ciphers[J].The Computer Journal,2024,67(2):537-547.
[9]BAO Z,LU J,YAO Y,et al.More insight on deep learning-aided cryptanalysis[C]//Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security.Singapore:Springer,2023:436-467.
[10]SHEN D,SONG Y,LU Y,et al.Neural differential distingui-shers for GIFT-128 and ASCON[J].Journal of Information Secu-rity and Applications,2024,82:103758.
[11]ZHANG L,WANG Z L,WANG B C.Improving Differential-Neural Cryptanalysis[J].IACR Communications in Cryptology,2024,1(3):13.
[12]WANG G,WANG G,SUN S.Investigating and enhancing theneural distinguisher for differential cryptanalysis[J].IEICE Transactions on Information and Systems,2024,107:1016-1028.
[13]SEOK B,LEE C.A novel approach to construct a good dataset for differential-neural cryptanalysis[J].IEEE Transactions on Dependable and Secure Computing,2024,22:246-262.
[14]BANIK S,PANDEY S K,PEYRIN T,et al.GIFT:A smallpresent:Towards reaching the limit of lightweight encryption[C]//Proceedings of Cryptographic Hardware and Embedded Systems.Springer,2017:321-345.
[15]DOBRUNIG C,EICHLSEDER M,MENDEL F,et al.Asconv1.2:lightweight authenticated encryption and hashing[J].Journal of Cryptology,2021,34:1-42.
[16]BENAMIRA A,GERAULT D,PEYRIN T,et al.A DeeperLook at Machine Learning-Based Cryptanalysis[C]//Advances in Cryptology-EUROCRYPT 2021.Cham:Springer,2021:436-467.
[1] FU Yukai, LI Qingzhen, DONG Zhixue, SHI Dongli, ZHAO Peng. Pedestrian Re-identification Methods Based on Limited Target Data and Deep Learning [J]. Computer Science, 2026, 53(3): 287-294.
[2] YU Ding, LI Zhangwei. Prediction Method of RNA Secondary Structure Based on Transformer Architecture [J]. Computer Science, 2026, 53(3): 375-382.
[3] DU Jiantong, GUAN Zeli, XUE Zhe. Multi-task Learning-based Ophthalmic Video Feature Fusion and Multi-dimensional Profiling [J]. Computer Science, 2026, 53(3): 383-391.
[4] LI Zequn, DING Fei. Fatigue Driving Detection Based on Dual-branch Fusion and Segmented Domain AdaptationTransfer Learning [J]. Computer Science, 2026, 53(3): 78-87.
[5] XI Penghui, WU Xiazhen, JIANG Wencong, FANG Liangda, HE Chaobo, GUAN Quanlong. Review of Personalized Educational Resource Recommendations [J]. Computer Science, 2026, 53(2): 1-15.
[6] HUANG Jing, WANG Teng, LIU Jian, HU Kai, PENG Xin, HUANG Yamin, WEN Yuanqiao. Multimodal Visual Detection for Underwater Sonar Target Images [J]. Computer Science, 2026, 53(2): 227-235.
[7] LIU Chenhong, LI Fenglian, YANG Jia, WANG Suzhe, CHEN Guijun. Boundary-focused Multi-scale Feature Fusion Network for Stroke Lesion Segmentation [J]. Computer Science, 2026, 53(2): 264-272.
[8] HUANG Miaomiao, WANG Huiying, WANG Meixia, WANG Yejiang , ZHAO Yuhai. Review of Graph Embedding Learning Research:From Simple Graph to Complex Graph [J]. Computer Science, 2026, 53(1): 58-76.
[9] WANG Cheng, JIN Cheng. KAN-based Unsupervised Multivariate Time Series Anomaly Detection Network [J]. Computer Science, 2026, 53(1): 89-96.
[10] XUE Jingyan, XIA Jianan, HUO Ruili, LIU Jie, ZHOU Xuezhong. Review of Retinal Image Analysis Methods for OCT/OCTA Based on Deep Learning [J]. Computer Science, 2026, 53(1): 128-140.
[11] ZHOU Bingquan, JIANG Jie, CHEN Jiangmin, ZHAN Lixin. EvR-DETR:Event-RGB Fusion for Lightweight End-to-End Object Detection [J]. Computer Science, 2026, 53(1): 153-162.
[12] YIN Shi, SHI Zhenyang, WU Menglin, CAI Jinyan, YU De. Deep Learning-based Kidney Segmentation in Ultrasound Imaging:Current Trends and Challenges [J]. Computer Science, 2025, 52(9): 16-24.
[13] ZENG Lili, XIA Jianan, LI Shaowen, JING Maike, ZHAO Huihui, ZHOU Xuezhong. M2T-Net:Cross-task Transfer Learning Tongue Diagnosis Method Based on Multi-source Data [J]. Computer Science, 2025, 52(9): 47-53.
[14] LI Yaru, WANG Qianqian, CHE Chao, ZHU Deheng. Graph-based Compound-Protein Interaction Prediction with Drug Substructures and Protein 3D Information [J]. Computer Science, 2025, 52(9): 71-79.
[15] LUO Chi, LU Lingyun, LIU Fei. Partial Differential Equation Solving Method Based on Locally Enhanced Fourier NeuralOperators [J]. Computer Science, 2025, 52(9): 144-151.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!