Algebraic Analysis of the Simon Block Cipher Family

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9230)

Abstract

This paper focuses on algebraic attacks on the Simon family of block ciphers. We construct equation systems using multiple plaintext/ciphertext pairs, and show that many variables in the cipher states coming from different plaintexts are linearly related. A simple solving algorithm exploiting these relations is developed and extensively tested on the different Simon variants, giving efficient algebraic attacks on up to 16 rounds of the largest Simon variants.

Keywords

Block cipher Algebraic attack Equation system Simon 

References

  1. 1.
    Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK Families of Lightweight Block Ciphers, Cryptology ePrint Archive, Report 2013/404 (2013). http://eprint.iacr.org/2013/404
  2. 2.
    Biryukov, A., Roy, A., Velichkov, V.: Differential analysis of block ciphers SIMON and SPECK. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 546–570. Springer, Heidelberg (2015) Google Scholar
  3. 3.
    Abed, F., List, E., Lucks, S., Wenzel, J.: Differential cryptanalysis of round-reduced Simon and Speck. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 525–545. Springer, Heidelberg (2015) Google Scholar
  4. 4.
    Wang, Q., Liu, Z., Varici, Y., Sasaki, V., Rijmen, Y.: Cryptanalysis of reduced-round SIMON32 and SIMON48. In: Meier, W., Mukhopadhyay, D. (eds.) Progress in Cryptology – INDOCRYPT 2014. LNCS, pp. 143–160. Springer, Switzerland (2014) Google Scholar
  5. 5.
    Alkhzaimi, H.A., Lauridsen, M.M.: Cryptanalysis of the SIMON Family of Block Ciphers, Cryptology ePrint Archive, Report 2013/543 (2013). http://eprint.iacr.org/2013/543
  6. 6.
    Alizadeh, J., Bagheri, N., Gauravaram, P., Kumar, A., Sanadhya, S.K.: Linear Cryptanalysis of Round Reduced SIMON, Cryptology ePrint Archive, Report 2013/663 (2013). http://eprint.iacr.org/2013/663
  7. 7.
    Wang, N., Wang, X., Jia, K., Zhao, J.: Improved Differential Attacks on Reduced SIMON Versions, Cryptology ePrint Archive, Report 2014/448 (2014). http://eprint.iacr.org/2014/448
  8. 8.
    Alizadeh, J., Alkhazaimi, H.A., Aref, M.R., Bagheri, N., Gauravaram, P., Lauridsen, M.M.: Improved Linear Cryptanalysis of Round Reduced SIMON, Cryptology ePrint Archive, Report 2014/681 (2014). http://eprint.iacr.org/2014/681
  9. 9.
    Shi, D., Hu, L., Sun, S., Song, L., Qiao, K., Ma, X.: Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON, Cryptology ePrint Archive, Report 2014/973 (2014). http://eprint.iacr.org/2014/973
  10. 10.
    Ahmadian, Z., Rasoolzadeh, S., Salmasizadeh, M., Aref, M.R.: Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN, Cryptology ePrint Archive, Report 2015/040 (2015). http://eprint.iacr.org/2015/040
  11. 11.
    Kölbl, S., Leander, G., Tiessen, T.: Observations on the SIMON block cipher family, Cryptology ePrint Archive, Report 2015/145 (2015). http://eprint.iacr.org/2015/145
  12. 12.
    Courtois, N.T., Bard, G.V.: Algebraic cryptanalysis of the data encryption standard. In: Galbraith, S.D. (ed.) Cryptography and Coding 2007. LNCS, vol. 4887, pp. 152–169. Springer, Heidelberg (2007) Google Scholar
  13. 13.
    Schilling, T.E., Raddum, H.: Solving compressed right hand side equation systems with linear absorption. In: Helleseth, T., Jedwab, J. (eds.) SETA 2012. LNCS, vol. 7280, pp. 291–302. Springer, Heidelberg (2012) Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Simula Research LaboratoryBergenNorway

Personalised recommendations