In this paper, we focus on the software-optimized block cipher family Speck, and describe significantly improved attacks on all of its 10 variants. In particular, we increase the number of rounds which can be attacked by 1, 2, or 3, for 9 out of 10 round-reduced members of the family, while significantly improving the complexity of the previous best attack on the remaining round-reduced member. Our attacks use an untraditional key recovery technique for differential attacks, whose main ideas were published by Albrecht and Cid at FSE 2009 in the cryptanalysis of the block cipher PRESENT.
Despite our improved attacks, they do not seem to threaten the security of any member of Speck.
Category / Keywords: secret-key cryptography / Lightweight block cipher, Speck, cryptanalysis, differential attack, key recovery Original Publication (with minor differences): SAC 2014 Date: received 5 May 2014, last revised 31 Aug 2014 Contact author: dinur at di ens fr Available format(s): PDF | BibTeX Citation Version: 20140831:204257 (All versions of this report) Short URL: ia.cr/2014/320 Discussion forum: Show discussion | Start new discussion