Abstract
In 2013, NSA published a lightweight block cipher family, Simon, but left the security analysis and the design rationale as open problems. Kölbl et al. generalized Simon by regarding its rotation constants as a parameter and discussed the security of these Simon-like ciphers against differential and linear attacks in Crypto 2015. In this paper, we investigate both the security of Simon-like ciphers against integral attack as well as the design choice of NSA. Firstly, we use the inside-out approach to find the integral distinguishers for all Simon-like ciphers with arbitrary block size and rotation parameter. Based on the results, we derive the distribution of all possible parameters with respect to their distinguishers. Moreover, we give a comparison of the parameters by considering their behaviour in various block sizes, and therefore obtain 120 parameters that are equal or superior to the standard parameter. Finally, we discover an inherent flaw of re-using the round function in the key schedule, especially for the Simon-like ciphers. It can possibly explain why NSA does not adopt such an efficient design.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Abdelraheem, M.A., Alizadeh, J., Alkhzaimi, H.A., Aref, M.R., Bagheri, N., Gauravaram, P.: Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48. In: Biryukov, A., Goyal, V. (eds.) INDOCRYPT 2015. LNCS, vol. 9462, pp. 153–179. Springer, Heidelberg (2015). doi:10.1007/978-3-319-26617-6_9
Abed, F., List, E., Lucks, S., Wenzel, J.: Differential cryptanalysis of round-reduced simon and speck. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 525–545. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46706-0_27
Bagheri, N.: Linear cryptanalysis of reduced-round SIMECK variants. In: Biryukov, A., Goyal, V. (eds.) INDOCRYPT 2015. LNCS, vol. 9462, pp. 140–152. Springer, Heidelberg (2015). doi:10.1007/978-3-319-26617-6_8
Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK families of lightweight block ciphers. Cryptology ePrint Archive, Report 2013/404 (2013). http://eprint.iacr.org/
Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007). doi:10.1007/978-3-540-74735-2_31
Borghoff, J., Canteaut, A., Güneysu, T., Kavun, E.B., Knezevic, M.: PRINCE - a low-latency block cipher for pervasive computing applications. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 208–225. Springer, Heidelberg (2012)
Daemen, J., Knudsen, L., Rijmen, V.: The block cipher square. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 149–165. Springer, Heidelberg (1997). doi:10.1007/BFb0052343
Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED block cipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 326–341. Springer, Heidelberg (2011). doi:10.1007/978-3-642-23951-9_22
Knudsen, L., Wagner, D.: Integral cryptanalysis. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 112–127. Springer, Heidelberg (2002). doi:10.1007/3-540-45661-9_9
Kölbl, S., Leander, G., Tiessen, T.: Observations on the SIMON block cipher family. In: Gennaro, R., Robshaw, M. (eds.) CRYPTO 2015. LNCS, vol. 9216, pp. 161–185. Springer, Heidelberg (2015). doi:10.1007/978-3-662-47989-6_8
Kölbl, S., Roy, A.: A brief comparison of Simon and Simeck. Cryptology ePrint Archive, Report 2015/706 (2015). http://eprint.iacr.org/
Kondo, K., Sasaki, Y., Iwata, T.: On the design rationale of simon block cipher: integral attacks and impossible differential attacks against simon variants. In: Manulis, M., Sadeghi, A.-R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 518–536. Springer, Heidelberg (2016). doi:10.1007/978-3-319-39555-5_28
Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit blockcipher CLEFIA (extended abstract). In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 181–195. Springer, Heidelberg (2007). doi:10.1007/978-3-540-74619-5_12
Todo, Y.: Structural evaluation by generalized integral property. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 287–314. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46800-5_12
Todo, Y., Morii, M.: Bit-based division property and application to simon family. Cryptology ePrint Archive, Report 2016/285 (2016). http://eprint.iacr.org/2016/285
Wang, Q., Liu, Z., Varıcı, K., Sasaki, Y., Rijmen, V., Todo, Y.: Cryptanalysis of reduced-round SIMON32 and SIMON48. In: Meier, W., Mukhopadhyay, D. (eds.) INDOCRYPT 2014. LNCS, vol. 8885, pp. 143–160. Springer, Heidelberg (2014). doi:10.1007/978-3-319-13039-2_9
Wu, W., Zhang, L.: LBlock: a lightweight block cipher. In: Manulis, M., Sadeghi, A.-R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 327–344. Springer, Heidelberg (2011). doi:10.1007/978-3-642-21554-4_19
Yang, G., Zhu, B., Suder, V., Aagaard, M.D., Gong, G.: The Simeck Family of Lightweight Block Ciphers. In: Güneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 307–329. Springer, Heidelberg (2015). doi:10.1007/978-3-662-48324-4_16
Zhang, H., Wu, W., Wang, Y.: Integral attack against bit-oriented block ciphers. In: Kwon, S., Yun, A. (eds.) ICISC 2015. LNCS, vol. 9558, pp. 102–118. Springer, Heidelberg (2016). doi:10.1007/978-3-319-30840-1_7
Zhang, W., Su, B., Wu, W., Feng, D., Wu, C.: Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers. In: Manulis, M., Sadeghi, A.-R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 117–134. Springer, Heidelberg (2012). doi:10.1007/978-3-642-31284-7_8
Acknowledgments
We would like to thank the anonymous reviewers for their useful comments and suggestions. The research presented in this paper is supported by the National Basic Research Program of China (No. 2013CB338002) and National Natural Science Foundation of China (No. 61272476, 61672509 and 61232009).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
A Distinguisher for Parameter (0, b, c)
A Distinguisher for Parameter (0, b, c)
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Zhang, H., Wu, W. (2016). Structural Evaluation for Simon-Like Designs Against Integral Attack. In: Bao, F., Chen, L., Deng, R., Wang, G. (eds) Information Security Practice and Experience. ISPEC 2016. Lecture Notes in Computer Science(), vol 10060. Springer, Cham. https://doi.org/10.1007/978-3-319-49151-6_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-49151-6_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49150-9
Online ISBN: 978-3-319-49151-6
eBook Packages: Computer ScienceComputer Science (R0)