Research on Grain-128's cryptosystem recognition

As an important aspect of distinguishing attack, cryptosystem recognition is the foundation of cryptanalysis. We mainly focused on the recognition of Grain-128 between other 11 cryptosystems. Firstly, we extracted 25 features of ciphertexts, then we constructed cryptosystem recognition classifier based on random forest algorithm. The recognition experiments between Grain-128 and other 11 cryptosystems were implemented. The results of experiments show that, in the condition of known ciphertext, Grain-128 can be effectively identified from other 11 cryptosystems, the performance of randomness test based features are better than other existed features with its accuracy of cryptosystem recognition average over 10%. With maintaining the performance of features, some features’ dimension reductions are completed and features’ data utilities are improved by t-SNE algorithm. Keywords—cryptosystem recognition; block cipher; randomness test; feature extraction; random forest

[1]  S.P. Mansoor,et al.  Classifying encryption algorithms using pattern recognition techniques , 2010, 2010 IEEE International Conference on Information Theory and Information Security.

[2]  Seokhie Hong,et al.  Related-Key Chosen IV Attacks on Grain-v1 and Grain-128 , 2008, ACISP.

[3]  Allan Tomlinson,et al.  A Distinguishing Attack with a Neural Network , 2013, 2013 IEEE 13th International Conference on Data Mining Workshops.

[4]  Chellu Chandra Sekhar,et al.  Identification of Block Ciphers using Support Vector Machines , 2006, The 2006 IEEE International Joint Conference on Neural Network Proceedings.

[5]  盛合 志帆,et al.  Design and analysis of block ciphers , 2003 .

[6]  Adi Shamir,et al.  Breaking Grain-128 with Dynamic Cube Attacks , 2011, IACR Cryptol. ePrint Arch..

[7]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[8]  G. Griffin,et al.  Caltech-256 Object Category Dataset , 2007 .

[9]  R. Anitha,et al.  Identification of Encryption Algorithm Using Decision Tree , 2011 .

[10]  Shai Halevi,et al.  Cryptanalysis of Stream Ciphers with Linear Masking , 2002, CRYPTO.

[11]  Geoffrey E. Hinton,et al.  Visualizing Data using t-SNE , 2008 .

[12]  Vincent Rijmen,et al.  The eSTREAM Portfolio (rev. 1) , 2008 .

[13]  Hideki Imai,et al.  Generic cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128 , 2012, Period. Math. Hung..