Cryptology ePrint Archive: Report 2016/651

Pen and Paper Arguments for SIMON and SIMON-like Designs

Christof Beierle

Abstract: In this work, we analyze the resistance of SIMON-like ciphers against differential attacks without using computer-aided methods. In this context, we first define the notion of a SIMON-like cipher as a generalization of the SIMON design. For certain instances, we present a method for proving the resistance against differential attacks by upper bounding the probability of a differential characteristic by $2^{-2T+2}$ where $T$ denotes the number of rounds. Interestingly, if $2n$ denotes the block length, our result is sufficient in order to bound the probability by $2^{-2n}$ for all full-round variants of SIMON and Simeck. Thus, it guarantees security in a sense that, even having encryptions of the full codebook, one cannot expect a differential characteristic to hold. The important difference between previous works is that our proof can be verified by hand and thus contributes towards a better understanding of the design. However, it is to mention that we do not analyze the probability of multi-round differentials.

Although there are much better bounds known, especially for a high number of rounds, they are based on experimental search like using SAT/SMT solvers. While those results have already shown that SIMON can be considered resistant against differential cryptanalysis, our argument gives more insights into the design itself. As far as we know, this work presents the first non-experimental security argument for full-round versions of several SIMON-like instances.

Category / Keywords: secret-key cryptography / SIMON, Simeck, differential cryptanalysis, Feistel

Original Publication (in the same form): SCN 2016
DOI:
10.1007/978-3-319-44618-9_23

Date: received 23 Jun 2016, last revised 21 Sep 2016

Contact author: christof beierle at rub de

Available format(s): PDF | BibTeX Citation

Version: 20160921:134740 (All versions of this report)

Short URL: ia.cr/2016/651

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]