Cryptology ePrint Archive: Report 2014/922

Differential Analysis of Block Ciphers SIMON and SPECK

Alex Biryukov and Arnab Roy and Vesselin Velichkov

Abstract: In this paper we continue the previous line of research on the analysis of the differential properties of the lightweight block ciphers Simon and Speck. We apply a recently proposed technique for automatic search for differential trails in ARX ciphers and improve the trails in Simon32 and Simon48 previously reported as best. We further extend the search technique for the case of differen- tials and improve the best previously reported differentials on Simon32, Simon48 and Simon64 by exploiting more effectively the strong differential effect of the cipher. We also present improved trails and differentials on Speck32, Speck48 and Speck64. Using these new results we improve the currently best known attacks on several versions of Simon and Speck. A second major contribution of the paper is a graph based algorithm (linear time) for the computation of the exact differential probability of the main building block of Simon: an AND operation preceded by two bitwise shift operations. This gives us a better insight into the differential property of the Simon round function and differential effect in the cipher. Our algorithm is general and works for any rotation constants. The presented techniques are generic and are therefore applicable to a broader class of ARX designs.

Category / Keywords: secret-key cryptography / differential trail, tools for cryptanalysis, automatic search, ARX, Simon, Speck, lightweight ciphers

Original Publication (with minor differences): IACR-FSE-2014

Date: received 10 Nov 2014

Contact author: alex biryukov at uni lui

Available format(s): PDF | BibTeX Citation

Note: Revised FSE paper.

Version: 20141111:123252 (All versions of this report)

Short URL: ia.cr/2014/922

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]