Differential and Linear Cryptanalysis of Reduced-Round Simon Revision From October 9 , 2013
@inproceedings{Abed2013DifferentialAL, title={Differential and Linear Cryptanalysis of Reduced-Round Simon Revision From October 9 , 2013}, author={F. Abed and Eik List and S. Lucks and J. Wenzel}, year={2013} }
This paper presents differential attacks of round-reduced versions of Simon with up to 18/32, 19/36, 25/44, 35/54, and 46/72 rounds for the 32-, 48-, 64-, 96-, and 128-bit versions, respectively. Furthermore, we consider in brief related-key rectangle, impossible-differential, and also linear attacks. While all our attacks are completely academic, they demonstrate the drawback of the intensive optimizations in Simon.
Figures and Tables from this paper
40 Citations
Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques
- Mathematics, Computer Science
- FSE
- 2015
- 44
- PDF
Zero-Correlation Linear Cryptanalysis of Reduced-Round SIMON
- Computer Science
- Journal of Computer Science and Technology
- 2015
- 5
Improved Impossible Differential Attacks against Round-Reduced LBlock
- Computer Science, Mathematics
- IACR Cryptol. ePrint Arch.
- 2014
- 17
- PDF
Impossible Differential Cryptanalysis of Reduced Round SIMON
- Mathematics, Computer Science
- IACR Cryptol. ePrint Arch.
- 2015
- 12
- Highly Influenced
- PDF
Improved Linear Cryptanalysis of Round Reduced SIMON
- Computer Science, Mathematics
- IACR Cryptol. ePrint Arch.
- 2014
- 27
- Highly Influenced
Improved Linear Trails for the Block Cipher Simon
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2015
- 21
- PDF
Improved differential attack on 30-round SIMON64
- Mathematics
- Wuhan University Journal of Natural Sciences
- 2016
- 1
Combined algebraic and truncated differential cryptanalysis on reduced-round SIMON
- Computer Science
- 2014 11th International Conference on Security and Cryptography (SECRYPT)
- 2014
- 22
- Highly Influenced
- PDF
Differential Analysis on Simeck and SIMON with Dynamic Key-Guessing Techniques
- Computer Science
- ICISSP
- 2016
- 18
- PDF
References
SHOWING 1-10 OF 36 REFERENCES
Algebraic Techniques in Differential Cryptanalysis
- Mathematics, Computer Science
- IACR Cryptol. ePrint Arch.
- 2008
- 107
- PDF
Conditional Differential Cryptanalysis of Trivium and KATAN
- Mathematics, Computer Science
- Selected Areas in Cryptography
- 2011
- 68
- PDF
Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN
- Computer Science
- INDOCRYPT
- 2011
- 28
- PDF
Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers
- Mathematics, Computer Science
- Computing
- 2009
- 41
- PDF
On Correlation Between the Order of S-boxes and the Strength of DES
- Mathematics, Computer Science
- EUROCRYPT
- 1994
- 258
- PDF