首页> 外文会议>Interantioanl conference on applied cryptography and network security >On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants
【24h】

On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants

机译:关于西蒙块密码的设计原理:对西蒙变体的积分攻击和不可能的差分攻击

获取原文

摘要

Simon is a lightweight block cipher designed by NSA in 2013. NSA presented the specification and the implementation efficiency, but they did not provide detailed security analysis nor the design rationale. The original Simon has rotation constants of (1,8,2), and Kolbl et al. regarded the constants as a parameter (a,b,c), and analyzed the security of Simon block cipher variants against differential and linear attacks for all the choices of (a, b, c). This paper complements the result of Koelbl et al. by considering integral and impossible differential attacks. First, we search the number of rounds of integral distinguishers by using a supercomputer. Our search algorithm follows the previous approach by Wang et al., however, we introduce a new choice of the set of plaintexts satisfying the integral property. We show that the new choice indeed extends the number of rounds for several parameters. We also search the number of rounds of impossible differential characteristics based on the miss-in-the-middle approach. Finally, we make a comparison of all parameters from our results and the observations by Kolbl et al. Interesting observations are obtained, for instance we find that the optimal parameters with respect to the resistance against differential attacks are not stronger than the original parameter with respect to integral and impossible differential attacks. We also obtain a parameter that is better than the original parameter with respect to security against these four attacks.
机译:Simon是由NSA在2013年设计的轻量级分组密码。NSA提出了规范和实现效率,但未提供详细的安全性分析或设计原理。原始的西蒙具有(1,8,2)的旋转常数,而Kolbl等人。将常数视为参数(a,b,c),并针对(a,b,c)的所有选择分析了西蒙块密码变体针对差分和线性攻击的安全性。本文对Koelbl等人的结果进行了补充。通过考虑整体和不可能的差异攻击。首先,我们使用一台超级计算机搜索整数识别器的轮数。我们的搜索算法遵循Wang等人的先前方法,但是,我们介绍了满足整数属性的一组明文的新选择。我们表明,新的选择确实扩展了多个参数的回合数。我们还基于中间遗漏方法来搜索不可能的差分特征的轮数。最后,我们将我们的结果和Kolbl等人的观察结果中的所有参数进行比较。获得有趣的观察结果,例如,我们发现,针对差分攻击的抵抗力的最佳参数并不强于针对整体和不可能差分攻击的原始参数。在针对这四种攻击的安全性方面,我们还获得了一个比原始参数更好的参数。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号