Truncated differential based known-key attacks on round-reduced SIMON

被引:4
作者
Hao, Yonglin [1 ]
Meier, Willi [2 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[2] FHNW, Windisch, Switzerland
基金
中国国家自然科学基金;
关键词
Cryptanalysis; Truncated differential; Known-key attack; SIMON; NEAR-COLLISION ATTACKS; DISTINGUISHERS; FEISTEL;
D O I
10.1007/s10623-016-0242-3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
At Crypto 2015, Blondeau, Peyrin and Wang proposed a truncated-differentialbased known-key attack on full PRESENT, a nibble oriented lightweight block cipher with an SPN structure. The truncated difference they used is derived from the existing multidimensional linear characteristics. An innovative technique of their work is the design of a MITM layer added before the characteristic that covers extra rounds with a complexity lower than that of a generic construction. We notice that there are good linear hulls for bit-oriented block cipher SIMON corresponding to highly qualified truncated differential characteristics. Based on these characteristics, we propose known-key distinguishers on round-reduced SIMON block cipher family, which is bit oriented and has a Feistel structure. Similar to the MITM layer, we design a specific start-from-the-middle method for pre-adding extra rounds with complexities lower than generic bounds. With these techniques, we launch basic known-key attacks on round- reduced SIMON. We also involve some key guessing technique and further extend the basic attacks to more rounds. Our known-key attacks can reach as many as 29/32/38/48/63-rounds of SIMON 32/48/64/96/128, which comes quite close to the full number of rounds. To the best of our knowledge, these are the first known-key results on the block cipher SIMON.
引用
收藏
页码:467 / 492
页数:26
相关论文
共 44 条
[1]  
Abdelraheem M.A., 2014, IACR CRYPTOLOGY EPRI, V2014, P681
[2]   Improved Linear Cryptanalysis of Reduced-Round SIMON-32 and SIMON-48 [J].
Abdelraheem, Mohamed Ahmed ;
Alizadeh, Javad ;
Alkhzaimi, Hoda A. ;
Aref, Mohammad Reza ;
Bagheri, Nasour ;
Gauravaram, Praveen .
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2015, 2015, 9462 :153-179
[3]  
Abed F., 2014, LNCS, P525, DOI DOI 10.1007/978-3-662-46706-0
[4]  
Ashur T., 2015, IACR CRYPTOLOGY EPRI, V2015, P285
[5]  
Beaulieu R., 2013, IACR Cryptol. ePrint Arch., V2013, P404
[6]   The SIMON and SPECK lightweight block ciphers [J].
Beaulieu, Ray ;
Shors, Douglas ;
Smith, Jason ;
Treatman-Clark, Stefan ;
Weeks, Bryan ;
Wingers, Louis .
2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
[7]  
Biryukov A, 2014, LNCS, P546, DOI DOI 10.1007/978-3-662-46706-0
[8]  
Black J, 2002, LECT NOTES COMPUT SC, V2442, P320
[9]   Known-Key Distinguisher on Full PRESENT [J].
Blondeau, Celine ;
Peyrin, Thomas ;
Wang, Lei .
ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 :455-474
[10]  
Blondeau C, 2014, LECT NOTES COMPUT SC, V8441, P165, DOI 10.1007/978-3-642-55220-5_10