Cryptology ePrint Archive: Report 2020/486

Rotational-XOR Cryptanalysis of Simon-like Block Ciphers

Jinyu Lu and Yunwen Liu and Tomer Ashur and Bing Sun and Chao Li

Abstract: Rotational-XOR cryptanalysis is a cryptanalytic method aimed at finding distinguishable statistical properties in ARX-C ciphers, i.e., ciphers that can be described only using modular addition, cyclic rotation, XOR, and the injection of constants. In this paper we extend RX-cryptanalysis to AND-RX ciphers, a similar design paradigm where the modular addition is replaced by vectorial bitwise AND; such ciphers include the block cipher families Simon and Simeck. We analyse the propagation of RX-differences through AND-RX rounds and develop closed form formula for their expected probability. Finally, we formulate an SMT model for searching RX-characteristics in simon and simeck. Evaluating our model we find RX-distinguishers of up to 20, 27, and 35 rounds with respective probabilities of $2^{-26}, 2^{-42}$, and $2^{-54}$ for versions of simeck with block sizes of 32, 48, and 64 bits, respectively, for large classes of weak keys in the related-key model. In most cases, these are the longest published distinguishers for the respective variants of simeck.

Interestingly, when we apply the model to the block cipher simon, the best distinguisher we are able to find covers 11 rounds of SIMON32 with probability $2^{-24}$. To explain the gap between simon and simeck in terms of the number of distinguished rounds we study the impact of the key schedule and the specific rotation amounts of the round function on the propagation of RX-characteristics in Simon-like ciphers.

Category / Keywords: secret-key cryptography / RX-cryptanalysis · Simeck· Simon· Key Schedule

Original Publication (in the same form): ACISP 2020

Date: received 26 Apr 2020, last revised 24 May 2020

Contact author: univerlyw at hotmail com

Available format(s): PDF | BibTeX Citation

Version: 20200525:014812 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]