Differential attacks on reduced SIMON versions with dynamic key-guessing techniques
基本信息来源于合作网站,原文需代理用户跳转至来源网站获取
摘要:
In 2013,NSA published the specifications of two lightweight block cipher families SIMON and SPECK [1].Since the SIMON family was announced,it has attracted a lot of attention of the cryptanalysts.In this article,we use the existing differential characteristics given in [2-5] to analyze the reduced SIMON versions.Firstly,we extend the characteristics backward and forward for several rounds and get the full differential path we need.Similar to Wang et al.'s method in [6],we deduce the sufficient bit conditions corresponding to the differential propagations.We find that the bit conditions can be divided into two types.The conditions of the first type only depend on plain-texts or ciphertexts,which can be fulfilled by selecting the conforming plaintexts,ciphertexts and building the data structures.