Structural Evaluation for Simon-Like Designs Against Integral Attack

被引:6
|
作者
Zhang, Huiling [1 ,2 ,3 ]
Wu, Wenling [1 ,3 ]
机构
[1] Chinese Acad Sci, Inst Software, SKLCS, TCA Lab, Beijing 100190, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Univ Chinese Acad Sci, Beijing 100190, Peoples R China
来源
INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2016 | 2016年 / 10060卷
关键词
Lightweight ciphers; Simon; Simeck; Design rationale; Integral attack; Rotation constants; Key schedule; LINEAR CRYPTANALYSIS;
D O I
10.1007/978-3-319-49151-6_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 2013, NSA published a lightweight block cipher family, Simon, but left the security analysis and the design rationale as open problems. Kolbl et al. generalized Simon by regarding its rotation constants as a parameter and discussed the security of these Simon-like ciphers against differential and linear attacks in Crypto 2015. In this paper, we investigate both the security of Simon-like ciphers against integral attack as well as the design choice of NSA. Firstly, we use the inside-out approach to find the integral distinguishers for all Simon-like ciphers with arbitrary block size and rotation parameter. Based on the results, we derive the distribution of all possible parameters with respect to their distinguishers. Moreover, we give a comparison of the parameters by considering their behaviour in various block sizes, and therefore obtain 120 parameters that are equal or superior to the standard parameter. Finally, we discover an inherent flaw of re-using the round function in the key schedule, especially for the Simon-like ciphers. It can possibly explain why NSA does not adopt such an efficient design.
引用
收藏
页码:194 / 208
页数:15
相关论文
共 14 条
  • [1] Pen and Paper Arguments for SIMON and SIMON-like Designs
    Beierle, Christof
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016, 2016, 9841 : 431 - 446
  • [2] Rotational-XOR Cryptanalysis of Simon-Like Block Ciphers
    Lu, Jinyu
    Liu, Yunwen
    Ashur, Tomer
    Sun, Bing
    Li, Chao
    INFORMATION SECURITY AND PRIVACY, ACISP 2020, 2020, 12248 : 105 - 124
  • [3] On the Effect of the Key-Expansion Algorithm in Simon-like Ciphers
    Lu, Jinyu
    Liu, Yunwen
    Ashur, Tomer
    Li, Chao
    COMPUTER JOURNAL, 2022, 65 (09) : 2454 - 2469
  • [4] Improved rotational-XOR cryptanalysis of Simon-like block ciphers
    Lu, Jinyu
    Liu, Yunwen
    Ashur, Tomer
    Sun, Bing
    Li, Chao
    IET INFORMATION SECURITY, 2022, 16 (04) : 282 - 300
  • [5] Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers
    Wang, Xuzi
    Wu, Baofeng
    Hou, Lin
    Lin, Dongdai
    CYBERSECURITY, 2021, 4 (01)
  • [6] Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers
    Xuzi Wang
    Baofeng Wu
    Lin Hou
    Dongdai Lin
    Cybersecurity, 4
  • [7] On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants
    Kondo, Kota
    Sasaki, Yu
    Iwata, Tetsu
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 518 - 536
  • [8] Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILP
    Wang, Xuzi
    Wu, Baofeng
    Hou, Lin
    Lin, Dongdai
    INFORMATION SECURITY (ISC 2018), 2018, 11060 : 116 - 131
  • [9] On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants
    Kondo, Kota
    Sasaki, Yu
    Todo, Yosuke
    Iwata, Tetsu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01) : 88 - 98
  • [10] An efficient differential fault attack against SIMON key schedule
    Zhang, Jinbao
    Wang, Jiehua
    Bin, Ge
    Li, Jianhua
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 66