Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2018, Article ID 5160237, 11 pages
https://doi.org/10.1155/2018/5160237
Research Article

Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques

1Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan 250100, China
2School of Mathematics, Shandong University, Jinan 250100, China
3Institute for Advanced Study, Tsinghua University, Beijing 100084, China

Correspondence should be addressed to Xiaoyun Wang; nc.ude.auhgnist.liam@gnawnuyoaix

Received 17 July 2017; Accepted 3 January 2018; Published 19 February 2018

Academic Editor: Barbara Masucci

Copyright © 2018 Zhihui Chu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Daemen, L. R. Knudsen, and V. Rijmen, “The block cipher square,” in Fse, vol. 97, pp. 149–165, Springer, 1997. View at Google Scholar
  2. B. Ray, S. Douglas, S. Jason, T. Stefan, W. Bryan, and W. Louis, “The simon and speck families of lightweight block ciphers,” Cryptology ePrint Archive Report 2013/404, 2013. View at Google Scholar
  3. M. A. Abdelraheem, J. Alizadeh, H. A. Alkhzaimi, M. R. Aref, N. Bagheri, and P. Gauravaram, “Improved linear cryptanalysis of reduced-round simon-32 and simon-48,” in Proceedings of the International Conference in Cryptology in India, vol. 9462 of Lecture Notes in Comput. Sci., pp. 153–179, Springer, Cham, Germany, December 2015. View at Publisher · View at Google Scholar · View at MathSciNet
  4. P. Ahir, M. Mozaffari-Kermani, and R. Azarderakhsh, “Lightweight architectures for reliable and fault detection Simon and Speck cryptographic algorithms on FPGA,” ACM Transactions on Embedded Computing Systems, vol. 16, no. 4, article no. 109, 2017. View at Publisher · View at Google Scholar · View at Scopus
  5. A. Aysu, E. Gulcan, and P. Schaumont, “SIMON says: Break area records of block ciphers on FPGAs,” IEEE Embedded Systems Letters, vol. 6, no. 2, pp. 37–40, 2014. View at Publisher · View at Google Scholar · View at Scopus
  6. H. Chen and X. Wang, “Improved linear hull attack on round-reduced SIMON with dynamic key-guessing techniques,” in International Conference on Fast Software Encryption, vol. 9783, pp. 428–449, Springer, Berlin, Heidelberg, 2016. View at Publisher · View at Google Scholar · View at Scopus
  7. K. Fu, L. Sun, and M. Wang, “New integral attacks on SIMON,” IET Information Security, vol. 11, no. 5, pp. 277–286, 2017. View at Publisher · View at Google Scholar · View at Scopus
  8. Y. Hao and W. Meier, “Truncated differential based known-key attacks on round-reduced simon,” Designs, Codes and Cryptography, vol. 83, no. 2, pp. 467–492, 2017. View at Publisher · View at Google Scholar · View at MathSciNet
  9. S. Kölbl, G. Leander, and T. Tiessen, “Observations on the simon block cipher family,” in Annual Cryptology Conference, vol. 9215 of Lecture Notes in Comput. Sci., pp. 161–185, Springer, Heidelberg, Germany, 2015. View at Publisher · View at Google Scholar · View at MathSciNet
  10. K. Kondo, Y. Sasaki, and T. Iwata, “On the design rationale of SIMON block cipher: Integral attacks and impossible differential attacks against SIMON variants,” in International Conference on Applied Cryptography and Network Security, vol. 9696, pp. 518–536, Springer, Cham, Switzerland, 2016. View at Publisher · View at Google Scholar · View at Scopus
  11. K. Kondo, Y. Sasaki, Y. Todo, and T. Iwata, “Analyzing key schedule of SIMON: Iterative key differences and application to related-key impossible differentials,” in International Workshop on Security, vol. 10418, pp. 141–158, Springer, Cham, Switzerland, 2017. View at Publisher · View at Google Scholar · View at Scopus
  12. R. Nithya and D. S. Kumar, “Where aes is for internet, simon could be for iot,” Procedia Technology, vol. 25, pp. 302–309, 2016. View at Google Scholar
  13. K. Qiao, L. Hu, and S. Sun, “Differential analysis on simeck and simon with dynamic key-guessing techniques,” in Proceedings of the International Conference on Information Systems Security and Privacy, pp. 64–85, Springer, 2016.
  14. A. Shahverdi, M. Taha, and T. Eisenbarth, “Lightweight Side Channel Resistance: Threshold Implementations of Simon,” IEEE Transactions on Computers, vol. 66, no. 4, pp. 661–671, 2017. View at Publisher · View at Google Scholar · View at Scopus
  15. D. Shi, L. Hu, S. Sun, L. Song, K. Qiao, and X. Ma, “Improved linear (hull) cryptanalysis of round-reduced versions of SIMON,” Science China Information Sciences, vol. 60, no. 3, Article ID 39101, 2017. View at Publisher · View at Google Scholar · View at Scopus
  16. P. Suil, P. Sepehrdad, S. Vaudenay, N. Courtois, and P. Sušil, “On selection of samples in algebraic attacks and a new technique to find hidden low degree equations,” International Journal of Information Security, vol. 15, no. 1, pp. 51–65, 2016. View at Google Scholar
  17. Y. Todo, “Structural evaluation by generalized integral property,” in Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 287–314, Springer, 2015.
  18. Y. Todo and M. Morii, “Bit-based division property and application to SIMON family,” in International Conference on Fast Software Encryption, vol. 9783, pp. 357–377, Springer, Berlin, Heidelberg, 2016. View at Publisher · View at Google Scholar · View at Scopus
  19. G. Wang, N. Gan, and Y. Li, “Improved differential attack on 30-round simon64,” Wuhan University Journal of Natural Sciences, vol. 21, no. 1, pp. 75–83, 2016. View at Publisher · View at Google Scholar · View at MathSciNet
  20. N. Wang, X. Wang, K. Jia, and J. Zhao, “Differential attacks on reduced simon versions with dynamic key-guessing techniques,” Cryptology ePrint Archive Report 2014/448, 2014. View at Google Scholar
  21. Q. Wang, Z. Liu, K. Varıcı, Y. Sasaki, V. Rijmen, and Y. Todo, “Cryptanalysis of reduced-round SIMON32 and SIMON48,” in International Conference in Cryptology in India, vol. 8885, pp. 143–160, Springer, Cham, Switzerland, 2014. View at Publisher · View at Google Scholar · View at Scopus
  22. Z. Xiang, W. Zhang, Z. Bao, and D. Lin, “Applying milp method to searching integral distinguishers based on division property for 6 lightweight block ciphers,” in Advances in Cryptology–ASIACRYPT, vol. 10031 of Lecture Notes in Comput. Sci., pp. 648–678, Springer, Berlin, Germany, 2016. View at Publisher · View at Google Scholar · View at MathSciNet
  23. Z. Xiang, W. Zhang, and D. Lin, “On the division property of SIMON48 and SIMON64,” in International Workshop on Security, vol. 9836, pp. 147–163, Springer, Cham, Switzerland, 2016. View at Publisher · View at Google Scholar · View at Scopus
  24. X.-L. Yu, W.-L. Wu, Z.-Q. Shi, J. Zhang, L. Zhang, and Y.-F. Wang, “Zero-correlation linear cryptanalysis of reduced-round simon,” Journal of Computer Science and Technology, vol. 30, no. 6, pp. 1358–1369, 2015. View at Publisher · View at Google Scholar · View at MathSciNet
  25. P. Zajac, “Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity,” Designs, Codes and Cryptography. An International Journal, vol. 82, no. 1-2, pp. 43–56, 2017. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  26. G. Yang, B. Zhu, V. Suder, M. D. Aagaard, and G. Gong, “The simeck family of lightweight block ciphers,” in International Workshop on Cryptographic Hardware and Embedded Systems, vol. 9293, pp. 307–329, Springer, Berlin, Heidelberg, 2015. View at Publisher · View at Google Scholar · View at Scopus
  27. L. Qin, H. Chen, and X. Wang, “Linear hull attack on round-reduced simeck with dynamic key-guessing techniques,” in Australasian Conference on Information Security and Privacy, vol. 9723, pp. 409–424, Springer, Cham, Switzerland, 2016. View at Publisher · View at Google Scholar · View at Scopus