TY - GEN
T1 - Differential analysis on simeck and SIMON with dynamic key-guessing techniques
AU - Qiao, Kexin
AU - Hu, Lei
AU - Sun, Siwei
N1 - Publisher Copyright:
© Springer International Publishing AG 2017.
PY - 2017
Y1 - 2017
N2 - In CHES 2015, a new lightweight block cipher Simeck was proposed that combines good design components of SIMON and SPECK, two lightweight ciphers designed by NSA. As a great tool to improve differential attack, dynamic key-guessing techniques were proposed by Wang et al. that work well on SIMON. In this paper, we convert the dynamic key-guessing techniques to a program that can automatically give out the data in dynamic key-guessing procedure. With our tool, the differential security evaluation of SIMON and Simeck like block ciphers becomes very convenient.We apply the method to Simeck and four members of SIMON family. With a differential of lower Hamming weight we find by Mixed Integer Linear Programming method and differentials in Kölbl et al.’s work, we launch attacks on 21, 22-round Simeck32, 28- round Simeck48 and 34, 35-round Simeck64. Besides, by use of newly proposed differentials in CRYPTO 2015 we get new attack results on 22- round SIMON32/64, 24-round SIMON48/96, 28, 29-round SIMON64/96 and 29, 30-round SIMON64/128. As far as we are concerned, our results on SIMON64 are currently the best results.
AB - In CHES 2015, a new lightweight block cipher Simeck was proposed that combines good design components of SIMON and SPECK, two lightweight ciphers designed by NSA. As a great tool to improve differential attack, dynamic key-guessing techniques were proposed by Wang et al. that work well on SIMON. In this paper, we convert the dynamic key-guessing techniques to a program that can automatically give out the data in dynamic key-guessing procedure. With our tool, the differential security evaluation of SIMON and Simeck like block ciphers becomes very convenient.We apply the method to Simeck and four members of SIMON family. With a differential of lower Hamming weight we find by Mixed Integer Linear Programming method and differentials in Kölbl et al.’s work, we launch attacks on 21, 22-round Simeck32, 28- round Simeck48 and 34, 35-round Simeck64. Besides, by use of newly proposed differentials in CRYPTO 2015 we get new attack results on 22- round SIMON32/64, 24-round SIMON48/96, 28, 29-round SIMON64/96 and 29, 30-round SIMON64/128. As far as we are concerned, our results on SIMON64 are currently the best results.
KW - Differential cryptanalysis
KW - Dynamic key-guessing
KW - SIMON
KW - Simeck
UR - http://www.scopus.com/inward/record.url?scp=85014230522&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-54433-5_5
DO - 10.1007/978-3-319-54433-5_5
M3 - Conference contribution
AN - SCOPUS:85014230522
SN - 9783319544328
T3 - Communications in Computer and Information Science
SP - 64
EP - 85
BT - Information Systems Security and Privacy - 2nd International Conference, ICISSP 2016, Revised Selected Papers
A2 - Mori, Paolo
A2 - Furnell, Steven
A2 - Camp, Olivier
PB - Springer Verlag
T2 - Doctoral Consortium - 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016
Y2 - 19 February 2016 through 21 February 2016
ER -