Skip to main content
Log in

A revisited security evaluation of Simeck family ciphers against impossible differential cryptanalysis

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Yang G, Zhu B, Suder V, et al. The simeck family of lightweight block ciphers. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems. Berlin: Springer, 2015. 307–329

    Google Scholar 

  2. Knudsen L. DEAL-a 128-bit block cipher. Complexity, 1998, 258: 216

    Google Scholar 

  3. Biham E, Biryukov A, Shamir A. Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 1999. 12–23

    Google Scholar 

  4. Sadeghi S, Bagheri N. Improved zero-correlation and impossible differential cryptanalysis of reduced-round SIMECK block cipher. IET Inf Secur, 2018, 12: 314–325

    Article  Google Scholar 

  5. Wang X, Wu B, Hou L, et al. Automatic search for related-key differential trails in SIMON-like block ciphers based on MILP. In: Proceedings of International Conference on Information Security. Cham: Springer, 2018. 116–131

    Google Scholar 

  6. Wang X, Wu B, Hou L, et al. Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers. Cybersecurity, 2021, 4: 1–14

    Article  Google Scholar 

  7. Zhang K, Guan J, Hu B. Automatic search of impossible differentials and zero-correlation linear hulls for ARX ciphers. China Commun, 2018, 15: 54–66

    Article  Google Scholar 

  8. Isobe T, Shibutani K. Generic key recovery attack on Feis-tel scheme. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2013. 464–485

    Google Scholar 

  9. Sun L, Fu K, Wang M. Improved zero-correlation crypt-analysis on SIMON. In: Proceedings of International Conference on Information Security and Cryptology. Cham: Springer, 2015. 125–143

    Google Scholar 

  10. Zhang K, Guan J, Hu B, et al. Security evaluation on Simeck against zero-correlation linear cryptanalysis. IET Inf Security, 2018, 12: 87–93

    Article  Google Scholar 

  11. Boura C, Naya-Plasencia M, Suder V. Scrutinizing and improving impossible differential attacks: applications to CLEFIA, Camellia, LBlock and SIMON. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security, 2014. 8873: 179–199

    MathSciNet  Google Scholar 

Download references

Acknowledgements

This work was partially supported by National Natural Science Foundation of China (Grant Nos. 61802437, 61972248, 61902428, 62102448) and China Postdoctoral Science Foundation (Grant No. 2020M681314).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Kai Zhang or Xuejia Lai.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, K., Lai, X., Wang, L. et al. A revisited security evaluation of Simeck family ciphers against impossible differential cryptanalysis. Sci. China Inf. Sci. 66, 139106 (2023). https://doi.org/10.1007/s11432-022-3466-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-022-3466-x

Navigation