Observations on the SIMON block cipher family

  title={Observations on the SIMON block cipher family},
  author={Stefan K{\"o}lbl and Gregor Leander and Tyge Tiessen},
  booktitle={IACR Cryptology ePrint Archive},
In this paper we analyse the general class of functions underlying the Simon block cipher. In particular, we derive efficiently computable and easily implementable expressions for the exact differential and linear behaviour of Simon-like round functions. Following up on this, we use those expressions for a computer aided approach based on SAT/SMT solvers to find both optimal differential and linear characteristics for Simon. Furthermore, we are able to find all characteristics contributing to… CONTINUE READING
Highly Cited
This paper has 63 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 42 extracted citations

SLISCP-light: Towards Hardware Optimized Sponge-specific Cryptographic Permutations

ACM Trans. Embedded Comput. Syst. • 2018
View 7 Excerpts
Highly Influenced

The Security of SIMON-like Ciphers Against Linear Cryptanalysis

IACR Cryptology ePrint Archive • 2017
View 9 Excerpts
Highly Influenced

sLiSCP: Simeck-based Permutations for Lightweight Sponge Cryptographic Primitives

IACR Cryptology ePrint Archive • 2017
View 8 Excerpts
Highly Influenced

Pen and Paper Arguments for SIMON and SIMON-like Designs

IACR Cryptology ePrint Archive • 2016
View 5 Excerpts
Highly Influenced

Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48

IACR Cryptology ePrint Archive • 2015
View 9 Excerpts
Highly Influenced

64 Citations

Citations per Year
Semantic Scholar estimates that this publication has 64 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 18 references

The SIMON and SPECK Families of Lightweight Block Ciphers

IACR Cryptology ePrint Archive • 2013
View 6 Excerpts
Highly Influenced

CryptoSMT: An easy to use tool for cryptanalysis of symmetric primitives

S. Kölbl
View 2 Excerpts

Similar Papers

Loading similar papers…