首页> 中文期刊> 《武汉大学学报:自然科学英文版》 >Improved Differential Attack on 30-Round SIMON64

Improved Differential Attack on 30-Round SIMON64

         

摘要

In this paper we present an attack on 30-round SIMON64, which improves the best results on SIMON 64 by 1 round. We use a 23-round differential characteristic which was proposed by Itai et al in 2015 to construct a 30-round extended differential characteristized by adding 4 rounds on the top and 3 round on the bottom. Furthermore, we utilize all of the sufficient bit-conditions of the 30-round differential to compute a set of corresponding subkeys. Then we distribute the plaintext pairs over the 2^(86) lists corresponding to the 86-bit subkeys. If a list contains two or more pairs, we regard the subkeys corresponding to the list as candidate subkeys. The time complexity of our attack on 30-round SIMON64/96(SIMON64/128) is 2^(86.2)(2^(118.2)) with a success probability of 0.61, while the data complexity and the memory complexity are 2^(63.3) and 2^(90) bytes, respectively.

著录项

相似文献

  • 中文文献
  • 外文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号