Skip to main content

Structural Evaluation for Simon-Like Designs Against Integral Attack

  • Conference paper
  • First Online:
Book cover Information Security Practice and Experience (ISPEC 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10060))

Abstract

In 2013, NSA published a lightweight block cipher family, Simon, but left the security analysis and the design rationale as open problems. Kölbl et al. generalized Simon by regarding its rotation constants as a parameter and discussed the security of these Simon-like ciphers against differential and linear attacks in Crypto 2015. In this paper, we investigate both the security of Simon-like ciphers against integral attack as well as the design choice of NSA. Firstly, we use the inside-out approach to find the integral distinguishers for all Simon-like ciphers with arbitrary block size and rotation parameter. Based on the results, we derive the distribution of all possible parameters with respect to their distinguishers. Moreover, we give a comparison of the parameters by considering their behaviour in various block sizes, and therefore obtain 120 parameters that are equal or superior to the standard parameter. Finally, we discover an inherent flaw of re-using the round function in the key schedule, especially for the Simon-like ciphers. It can possibly explain why NSA does not adopt such an efficient design.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abdelraheem, M.A., Alizadeh, J., Alkhzaimi, H.A., Aref, M.R., Bagheri, N., Gauravaram, P.: Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48. In: Biryukov, A., Goyal, V. (eds.) INDOCRYPT 2015. LNCS, vol. 9462, pp. 153–179. Springer, Heidelberg (2015). doi:10.1007/978-3-319-26617-6_9

    Chapter  Google Scholar 

  2. Abed, F., List, E., Lucks, S., Wenzel, J.: Differential cryptanalysis of round-reduced simon and speck. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 525–545. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46706-0_27

    Google Scholar 

  3. Bagheri, N.: Linear cryptanalysis of reduced-round SIMECK variants. In: Biryukov, A., Goyal, V. (eds.) INDOCRYPT 2015. LNCS, vol. 9462, pp. 140–152. Springer, Heidelberg (2015). doi:10.1007/978-3-319-26617-6_8

    Chapter  Google Scholar 

  4. Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK families of lightweight block ciphers. Cryptology ePrint Archive, Report 2013/404 (2013). http://eprint.iacr.org/

  5. Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007). doi:10.1007/978-3-540-74735-2_31

    Chapter  Google Scholar 

  6. Borghoff, J., Canteaut, A., Güneysu, T., Kavun, E.B., Knezevic, M.: PRINCE - a low-latency block cipher for pervasive computing applications. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 208–225. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  7. Daemen, J., Knudsen, L., Rijmen, V.: The block cipher square. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 149–165. Springer, Heidelberg (1997). doi:10.1007/BFb0052343

    Chapter  Google Scholar 

  8. Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED block cipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 326–341. Springer, Heidelberg (2011). doi:10.1007/978-3-642-23951-9_22

    Chapter  Google Scholar 

  9. Knudsen, L., Wagner, D.: Integral cryptanalysis. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 112–127. Springer, Heidelberg (2002). doi:10.1007/3-540-45661-9_9

    Chapter  Google Scholar 

  10. Kölbl, S., Leander, G., Tiessen, T.: Observations on the SIMON block cipher family. In: Gennaro, R., Robshaw, M. (eds.) CRYPTO 2015. LNCS, vol. 9216, pp. 161–185. Springer, Heidelberg (2015). doi:10.1007/978-3-662-47989-6_8

    Chapter  Google Scholar 

  11. Kölbl, S., Roy, A.: A brief comparison of Simon and Simeck. Cryptology ePrint Archive, Report 2015/706 (2015). http://eprint.iacr.org/

  12. Kondo, K., Sasaki, Y., Iwata, T.: On the design rationale of simon block cipher: integral attacks and impossible differential attacks against simon variants. In: Manulis, M., Sadeghi, A.-R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 518–536. Springer, Heidelberg (2016). doi:10.1007/978-3-319-39555-5_28

    Chapter  Google Scholar 

  13. Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit blockcipher CLEFIA (extended abstract). In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 181–195. Springer, Heidelberg (2007). doi:10.1007/978-3-540-74619-5_12

    Chapter  Google Scholar 

  14. Todo, Y.: Structural evaluation by generalized integral property. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 287–314. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46800-5_12

    Google Scholar 

  15. Todo, Y., Morii, M.: Bit-based division property and application to simon family. Cryptology ePrint Archive, Report 2016/285 (2016). http://eprint.iacr.org/2016/285

  16. Wang, Q., Liu, Z., Varıcı, K., Sasaki, Y., Rijmen, V., Todo, Y.: Cryptanalysis of reduced-round SIMON32 and SIMON48. In: Meier, W., Mukhopadhyay, D. (eds.) INDOCRYPT 2014. LNCS, vol. 8885, pp. 143–160. Springer, Heidelberg (2014). doi:10.1007/978-3-319-13039-2_9

    Google Scholar 

  17. Wu, W., Zhang, L.: LBlock: a lightweight block cipher. In: Manulis, M., Sadeghi, A.-R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 327–344. Springer, Heidelberg (2011). doi:10.1007/978-3-642-21554-4_19

    Chapter  Google Scholar 

  18. Yang, G., Zhu, B., Suder, V., Aagaard, M.D., Gong, G.: The Simeck Family of Lightweight Block Ciphers. In: Güneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 307–329. Springer, Heidelberg (2015). doi:10.1007/978-3-662-48324-4_16

    Chapter  Google Scholar 

  19. Zhang, H., Wu, W., Wang, Y.: Integral attack against bit-oriented block ciphers. In: Kwon, S., Yun, A. (eds.) ICISC 2015. LNCS, vol. 9558, pp. 102–118. Springer, Heidelberg (2016). doi:10.1007/978-3-319-30840-1_7

    Chapter  Google Scholar 

  20. Zhang, W., Su, B., Wu, W., Feng, D., Wu, C.: Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers. In: Manulis, M., Sadeghi, A.-R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 117–134. Springer, Heidelberg (2012). doi:10.1007/978-3-642-31284-7_8

    Chapter  Google Scholar 

Download references

Acknowledgments

We would like to thank the anonymous reviewers for their useful comments and suggestions. The research presented in this paper is supported by the National Basic Research Program of China (No. 2013CB338002) and National Natural Science Foundation of China (No. 61272476, 61672509 and 61232009).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huiling Zhang .

Editor information

Editors and Affiliations

A Distinguisher for Parameter (0, b, c)

A Distinguisher for Parameter (0, bc)

Table 5. The length of the distinguisher (IND) for parameter (0, bc) when the block size is 32, 48, 64, 96 and 128, respectively.

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Zhang, H., Wu, W. (2016). Structural Evaluation for Simon-Like Designs Against Integral Attack. In: Bao, F., Chen, L., Deng, R., Wang, G. (eds) Information Security Practice and Experience. ISPEC 2016. Lecture Notes in Computer Science(), vol 10060. Springer, Cham. https://doi.org/10.1007/978-3-319-49151-6_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49151-6_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49150-9

  • Online ISBN: 978-3-319-49151-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics