{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:15:36Z","timestamp":1771697736442,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T00:00:00Z","timestamp":1699228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T00:00:00Z","timestamp":1699228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62206312"],"award-info":[{"award-number":["62206312"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In CRYPTO 2019, Gohr opens up a new direction for cryptanalysis. He successfully applied deep learning to differential cryptanalysis against the NSA block cipher SPECK32\/64, achieving higher accuracy than traditional differential distinguishers. Until now, one of the mainstream research directions is increasing the training sample size and utilizing different neural networks to improve the accuracy of neural distinguishers. This conversion mindset may lead to a huge number of parameters, heavy computing load, and a large number of memory in the distinguishers training process. However, in the practical application of cryptanalysis, the applicability of the attacks method in a resource-constrained environment is very important. Therefore, we focus on the cost optimization and aim to reduce network parameters for differential neural cryptanalysis.In this paper, we propose two cost-optimized neural distinguisher improvement methods from the aspect of data format and network structure, respectively. Firstly, we obtain a partial output difference neural distinguisher using only 4-bits training data format which is constructed with a new advantage bits search algorithm based on two key improvement conditions. In addition, we perform an interpretability analysis of the new neural distinguishers whose results are mainly reflected in the relationship between the neural distinguishers, truncated differential, and advantage bits. Secondly, we replace the traditional convolution with the depthwise separable convolution to reduce the training cost without affecting the accuracy as much as possible. Overall, the number of training parameters can be reduced by less than 50% by using our new network structure for training neural distinguishers. Finally, we apply the network structure to the partial output difference neural distinguishers. The combinatorial approach have led to a further reduction in the number of parameters (approximately 30% of Gohr\u2019s distinguishers for SPECK).<\/jats:p>","DOI":"10.1186\/s42400-023-00176-7","type":"journal-article","created":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T01:01:53Z","timestamp":1699232513000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A deep learning aided differential distinguisher improvement framework with more lightweight and universality"],"prefix":"10.1186","volume":"6","author":[{"given":"JiaShuo","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2223-4329","authenticated-orcid":false,"given":"JiongJiong","family":"Ren","sequence":"additional","affiliation":[]},{"given":"ShaoZhen","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,6]]},"reference":[{"key":"176_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22963-3_11","volume-title":"Enhancing differential-neural cryptanalysis","author":"Z Bao","year":"2022","unstructured":"Bao Z, Guo J, Liu M, Li M, Yi T (2022) Enhancing differential-neural cryptanalysis. Springer, Berlin"},{"key":"176_CR2","doi-asserted-by":"crossref","unstructured":"Benamira A, Gerault D, Peyrin T, Tan QQ (2021) A deeper look at machine learning-based cryptanalysis. In: Annual international conference on the theory and applications of cryptographic techniques, pp 805\u2013835. Springer","DOI":"10.1007\/978-3-030-77870-5_28"},{"issue":"1","key":"176_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E, Shamir A (1991) Differential cryptanalysis of des-like cryptosystems. J Cryptol 4(1):3\u201372","journal-title":"J Cryptol"},{"key":"176_CR4","doi-asserted-by":"crossref","unstructured":"Biham E, Chen R (2004) Near-collisions of sha-0. Lecture Notes in Computer Science","DOI":"10.1007\/978-3-540-28628-8_18"},{"issue":"4","key":"176_CR5","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1109\/TPAMI.2017.2699184","volume":"40","author":"L-C Chen","year":"2017","unstructured":"Chen L-C, Papandreou G, Kokkinos I, Murphy K, Yuille AL (2017) Deeplab: semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected crfs. IEEE Trans Pattern Anal Mach Intell 40(4):834\u2013848","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"176_CR6","doi-asserted-by":"crossref","unstructured":"Chollet F (2017) Xception: deep learning with depthwise separable convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1251\u20131258","DOI":"10.1109\/CVPR.2017.195"},{"key":"176_CR7","unstructured":"Ebrahimi A, Regazzoni F, Palmieri P (2021) Reducing the cost of machine learning differential attacks using bit selection and apartial ml-distinguisher. In: IACR Cryptology ePrint Archive"},{"key":"176_CR8","doi-asserted-by":"crossref","unstructured":"Gohr A (2019) Improving attacks on round-reduced speck32\/64 using deep learning. In: Proceedings of Advances in Cryptology - CRYPTO 2019, Santa Barbara, USA, pp 150\u2013179. Springer-verlag, Cham","DOI":"10.1007\/978-3-030-26951-7_6"},{"key":"176_CR9","doi-asserted-by":"crossref","unstructured":"He K, Gkioxari G, Doll\u00e1r P, Girshick Rs (2017) Mask r-cnn. In: Proceedings of the IEEE international conference on computer vision, pp 2961\u20132969","DOI":"10.1109\/ICCV.2017.322"},{"key":"176_CR16","doi-asserted-by":"crossref","unstructured":"He K, Xiangyu Z, Shaoqing R, Jian S (2016) Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"176_CR10","first-page":"489","volume":"3","author":"Z Hou","year":"2021","unstructured":"Hou Z, Ren J, Chen S (2021) Improve neural distinguisher for cryptanalysis. Cryptol ePrint Arch 3:489","journal-title":"Cryptol ePrint Arch"},{"key":"176_CR11","doi-asserted-by":"crossref","unstructured":"Hou Z, Ren J, Chen S (2022) Practical attacks of round-reduced simon based on deep learning","DOI":"10.1093\/comjnl\/bxac102"},{"key":"176_CR12","unstructured":"Howard AG, Menglong Z, Bo\u00a0C, Dmitry K, Weijun W, Tobias W, Marco A, Hartwig A (2017) Mobilenets: efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861,"},{"key":"176_CR13","doi-asserted-by":"crossref","unstructured":"Huang G, Liu Z, Van Der\u00a0M, Laurens W, Kilian Q (2017) Densely connected convolutional networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 4700\u20134708","DOI":"10.1109\/CVPR.2017.243"},{"key":"176_CR14","unstructured":"Iandola FN, Han S, Moskewicz MW, Ashraf K, Dally WJ, Keutzer K (2016) Squeezenet: Alexnet-level accuracy with 50x fewer parameters and $$<$$ 0.5 mb model size. arXiv preprint arXiv:1602.07360,"},{"key":"176_CR15","unstructured":"Jin J, Dundar A, Culurciello E (2014) Flattened convolutional neural networks for feedforward acceleration. arXiv preprint arXiv:1412.5474"},{"issue":"6","key":"176_CR17","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","volume":"60","author":"A Krizhevsky","year":"2017","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2017) Imagenet classification with deep convolutional neural networks. Commun ACM 60(6):84\u201390","journal-title":"Commun ACM"},{"key":"176_CR18","doi-asserted-by":"crossref","unstructured":"Liu W, Anguelov D, Erhan D, Szegedy C, Reed S, Fu C-Y, Berg AC (2016) Ssd: single shot multibox detector. In: European conference on computer vision, pp 21\u201337. Springer","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"176_CR19","doi-asserted-by":"crossref","unstructured":"Long J, Shelhamer En, Darrell T (2015) Fully convolutional networks for semantic segmentation. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 3431\u20133440","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"176_CR20","first-page":"89","volume":"2","author":"B Nicoleta-Norica","year":"2022","unstructured":"Nicoleta-Norica B (2022) Deep neural networks aiding cryptanalysis: a case study of the speck distinguisher. Appl Cryptogr Netw Secur 2:89","journal-title":"Appl Cryptogr Netw Secur"},{"key":"176_CR21","doi-asserted-by":"crossref","unstructured":"Rastegari M, Ordonez V, Redmon J, Farhadi A (2016) Xnor-net: Imagenet classification using binary convolutional neural networks. In: European conference on computer vision, pp 525\u2013542. Springer","DOI":"10.1007\/978-3-319-46493-0_32"},{"key":"176_CR22","unstructured":"Ray B, Douglas S, Jason S, Stefan T-C, Bryan W, Louis W (2015) The SIMON and SPECK families of lightweight block ciphers. In: Proceedings of the 52nd ACM\/EDAC\/IEEE Design Automation Conference-DAC 2015, San Francisco, USA, 8-12 June, pp 1\u20136. Association for Computing Machinery, New York, USA"},{"key":"176_CR23","doi-asserted-by":"crossref","unstructured":"Redmon J, Farhadi A (2017) Yolo9000: better, faster, stronger. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 7263\u20137271","DOI":"10.1109\/CVPR.2017.690"},{"key":"176_CR24","first-page":"741","volume":"28","author":"S Ren","year":"2015","unstructured":"Ren S, He K, Girshick R, Sun J (2015) Faster r-cnn: towards real-time object detection with region proposal networks. Adv Neural Inf Process Syst 28:741","journal-title":"Adv Neural Inf Process Syst"},{"key":"176_CR25","first-page":"214","volume":"3","author":"C Yi","year":"2021","unstructured":"Yi C, Yantian S, Hongbo Y, Sitong Y (2021) A new neural distinguisher considering features derived from multiple ciphertext pairs. Cryptol ePrint Arch 3:214","journal-title":"Cryptol ePrint Arch"},{"key":"176_CR26","first-page":"4158","volume":"7","author":"C Yi","year":"2022","unstructured":"Yi C, Yantian S, Hongbo Y, Sitong Y (2022) Neural aided statistical attack for cryptanalysis. Comput J 7:4158","journal-title":"Comput J"},{"key":"176_CR27","first-page":"589","volume":"2","author":"L Zhang","year":"2022","unstructured":"Zhang L, Wang Z, Wang B (2022) Improving differential-neural cryptanalysis with inception blocks. Cryptol ePrint Arch 2:589","journal-title":"Cryptol ePrint Arch"},{"key":"176_CR28","doi-asserted-by":"crossref","unstructured":"Zhang X, Zhou X, Lin M, Sun J (2018) Shufflenet: An extremely efficient convolutional neural network for mobile devices. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 6848\u20136856","DOI":"10.1109\/CVPR.2018.00716"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-023-00176-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-023-00176-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-023-00176-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T01:03:38Z","timestamp":1699232618000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-023-00176-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,6]]},"references-count":28,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["176"],"URL":"https:\/\/doi.org\/10.1186\/s42400-023-00176-7","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,6]]},"assertion":[{"value":"18 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financialinterests or personal relationships that could have appeared toinfluence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"47"}}