Differential attacks on reduced SIMON versions with dynamic key-guessing techniques
引用
分享
分享到微信朋友圈
打开微信,点击底部的“发现”,使用 “扫一扫” 即可将网页分享到我的朋友圈
In 2013,NSA published the specifications of two lightweight block cipher families SIMON and SPECK ”1”.Since the SIMON family was announced,it has attracted a lot of attention of the cryptanalysts.In this article,we use the existing differential characteristics given in ”2-5” to analyze the reduced SIMON versions.Firstly,we extend the characteristics backward and forward for several rounds and get the full differential path we need.Similar to Wang et al.”s method in ”6”,we deduce the sufficient bit conditions corresponding to the differential propagations.We find that the bit conditions can be divided into two types.The conditions of the first type only depend on plain-texts or ciphertexts,which can be fulfilled by selecting the conforming plaintexts,ciphertexts and building the data structures.
61
National Basic Research Program of China 973 ProgramGrant 2013CB834205;National Natural Science Foundation of ChinaGrant 61402256;National Key Research and Development Program of ChinaGrant 2017YFA0303903;National Cryptography Development FundGrant MMJJ20170121;Zhejiang Province Key R&D ProjectGrant 2017C01062