Pen and Paper Arguments for SIMON and SIMON-like Designs

被引:8
|
作者
Beierle, Christof [1 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
来源
SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016 | 2016年 / 9841卷
关键词
Simon; Simeck; Differential cryptanalysis; Feistel; DIFFERENTIAL CRYPTANALYSIS; FEISTEL CIPHERS; SECURITY;
D O I
10.1007/978-3-319-44618-9_23
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this work, we analyze the resistance of Simon-like ciphers against differential attacks without using computer-aided methods. In this context, we first define the notion of a Simon-like cipher as a generalization of the Simon design. For certain instances, we present a method for proving the resistance against differential attacks by upper bounding the probability of a differential characteristic by 2(-2T+ 2) where T denotes the number of rounds. Interestingly, if 2n denotes the block length, our result is sufficient in order to bound the probability by 2(-2n) for all full-round variants of Simon and Simeck. Thus, it guarantees security in a sense that, even having encryptions of the full codebook, one cannot expect a differential characteristic to hold. The important difference between previous works is that our proof can be verified by hand and thus contributes towards a better understanding of the design. However, it is to mention that we do not analyze the probability of multi-round differentials. Although there are much better bounds known, especially for a high number of rounds, they are based on experimental search like using SAT/SMT solvers. While those results have already shown that Simon can be considered resistant against differential cryptanalysis, our argument gives more insights into the design itself. As far as we know, this work presents the first non-experimental security argument for full-round versions of several Simon-like instances.
引用
收藏
页码:431 / 446
页数:16
相关论文
共 7 条
  • [1] Structural Evaluation for Simon-Like Designs Against Integral Attack
    Zhang, Huiling
    Wu, Wenling
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2016, 2016, 10060 : 194 - 208
  • [2] On the Effect of the Key-Expansion Algorithm in Simon-like Ciphers
    Lu, Jinyu
    Liu, Yunwen
    Ashur, Tomer
    Li, Chao
    COMPUTER JOURNAL, 2022, 65 (09) : 2454 - 2469
  • [3] Rotational-XOR Cryptanalysis of Simon-Like Block Ciphers
    Lu, Jinyu
    Liu, Yunwen
    Ashur, Tomer
    Sun, Bing
    Li, Chao
    INFORMATION SECURITY AND PRIVACY, ACISP 2020, 2020, 12248 : 105 - 124
  • [4] Improved rotational-XOR cryptanalysis of Simon-like block ciphers
    Lu, Jinyu
    Liu, Yunwen
    Ashur, Tomer
    Sun, Bing
    Li, Chao
    IET INFORMATION SECURITY, 2022, 16 (04) : 282 - 300
  • [5] Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers
    Wang, Xuzi
    Wu, Baofeng
    Hou, Lin
    Lin, Dongdai
    CYBERSECURITY, 2021, 4 (01)
  • [6] Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers
    Xuzi Wang
    Baofeng Wu
    Lin Hou
    Dongdai Lin
    Cybersecurity, 4
  • [7] Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILP
    Wang, Xuzi
    Wu, Baofeng
    Hou, Lin
    Lin, Dongdai
    INFORMATION SECURITY (ISC 2018), 2018, 11060 : 116 - 131