Rotational-XOR Cryptanalysis of Simon-Like Block Ciphers

被引:12
|
作者
Lu, Jinyu [1 ]
Liu, Yunwen [1 ]
Ashur, Tomer [2 ,3 ]
Sun, Bing [1 ]
Li, Chao [1 ]
机构
[1] Natl Univ Def Technol, Dept Math, Changsha, Peoples R China
[2] Katholieke Univ Leuven, Imec COSIC, Leuven, Belgium
[3] TU Eindhoven, Eindhoven, Netherlands
来源
INFORMATION SECURITY AND PRIVACY, ACISP 2020 | 2020年 / 12248卷
基金
中国国家自然科学基金;
关键词
RX-cryptanalysis; Simeck; Simon; Key schedule;
D O I
10.1007/978-3-030-55304-3_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Rotational-XOR cryptanalysis is a cryptanalytic method aimed at finding distinguishable statistical properties in ARX-C ciphers, i.e., ciphers that can be described only by using modular addition, cyclic rotation, XOR, and the injection of constants. In this paper we extend RX-cryptanalysis to AND-RX ciphers, a similar design paradigm where the modular addition is replaced by vectorial bitwise AND; such ciphers include the block cipher families Simon and Simeck. We analyze the propagation of RX-differences through AND-RX rounds and develop closed form formula for their expected probability. Finally, we formulate an SMT model for searching RX-characteristics in Simon and Simeck. Evaluating our model we find RX-characteristics of up to 20, 27, and 35 rounds with respective probabilities of 2(-26), 2(-42), and 2(-54) for versions of Simeck with block sizes of 32, 48, and 64 bits, respectively, for large classes of weak keys in the related-key model. In most cases, these are the longest published distinguishers for the respective variants of Simeck. Interestingly, when we apply the model to the block cipher Simon, the best characteristic we are able to find covers 11 rounds of Simon32 with probability 2-24. To explain the gap between Simon and Simeck in terms of the number of distinguished rounds we study the impact of the key schedule and the specific rotation amounts of the round function on the propagation of RX-characteristics in Simon-like ciphers.
引用
收藏
页码:105 / 124
页数:20
相关论文
共 17 条
  • [1] Improved rotational-XOR cryptanalysis of Simon-like block ciphers
    Lu, Jinyu
    Liu, Yunwen
    Ashur, Tomer
    Sun, Bing
    Li, Chao
    IET INFORMATION SECURITY, 2022, 16 (04) : 282 - 300
  • [2] Rotational-XOR Differential Cryptanalysis and an Automatic Framework for AND-RX Ciphers
    Zhang, Kai
    Lai, Xuejia
    Wang, Lei
    Guan, Jie
    Hu, Bin
    Wang, Senpeng
    Shi, Tairong
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (02) : 1282 - 1294
  • [3] Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers
    Wang, Xuzi
    Wu, Baofeng
    Hou, Lin
    Lin, Dongdai
    CYBERSECURITY, 2021, 4 (01)
  • [4] Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers
    Xuzi Wang
    Baofeng Wu
    Lin Hou
    Dongdai Lin
    Cybersecurity, 4
  • [5] On the Effect of the Key-Expansion Algorithm in Simon-like Ciphers
    Lu, Jinyu
    Liu, Yunwen
    Ashur, Tomer
    Li, Chao
    COMPUTER JOURNAL, 2022, 65 (09) : 2454 - 2469
  • [6] Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILP
    Wang, Xuzi
    Wu, Baofeng
    Hou, Lin
    Lin, Dongdai
    INFORMATION SECURITY (ISC 2018), 2018, 11060 : 116 - 131
  • [7] Pen and Paper Arguments for SIMON and SIMON-like Designs
    Beierle, Christof
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016, 2016, 9841 : 431 - 446
  • [8] Structural Evaluation for Simon-Like Designs Against Integral Attack
    Zhang, Huiling
    Wu, Wenling
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2016, 2016, 10060 : 194 - 208
  • [9] The SIMON and SPECK lightweight block ciphers
    Beaulieu, Ray
    Shors, Douglas
    Smith, Jason
    Treatman-Clark, Stefan
    Weeks, Bryan
    Wingers, Louis
    2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
  • [10] Differential Analysis of Block Ciphers SIMON and SPECK
    Biryukov, Alex
    Roy, Arnab
    Velichkov, Vesselin
    FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 : 546 - 570