Algebraic Analysis of the Simon Block Cipher Family

This paper focuses on algebraic attacks on the Simon family of block ciphers. We construct equation systems using multiple plaintext/ciphertext pairs, and show that many variables in the cipher states coming from different plaintexts are linearly related. A simple solving algorithm exploiting these relations is developed and extensively tested on the different Simon variants, giving efficient algebraic attacks on upi?źto 16 rounds of the largest Simon variants.

[1]  Vincent Rijmen,et al.  Cryptanalysis of Reduced-Round SIMON32 and SIMON48 , 2014, INDOCRYPT.

[2]  Nasour Bagheri,et al.  Linear Cryptanalysis of Round Reduced SIMON , 2013, IACR Cryptol. ePrint Arch..

[3]  Jason Smith,et al.  SIMON and SPECK: Block Ciphers for the Internet of Things , 2015, IACR Cryptol. ePrint Arch..

[4]  Jason Smith,et al.  The SIMON and SPECK Families of Lightweight Block Ciphers , 2013, IACR Cryptol. ePrint Arch..

[5]  Stefan Kölbl,et al.  Observations on the SIMON Block Cipher Family , 2015, CRYPTO.

[6]  Alex Biryukov,et al.  Differential Analysis of Block Ciphers SIMON and SPECK , 2014, FSE.

[7]  Nasour Bagheri,et al.  Improved Linear Cryptanalysis of Round Reduced SIMON , 2014, IACR Cryptol. ePrint Arch..

[8]  Gregory V. Bard,et al.  Algebraic Cryptanalysis of the Data Encryption Standard , 2007, IMACC.

[9]  Hoda AlKhzaimi,et al.  Cryptanalysis of the SIMON Family of Block Ciphers , 2013, IACR Cryptol. ePrint Arch..

[10]  Mohammad Reza Aref,et al.  Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN , 2015, IACR Cryptol. ePrint Arch..

[11]  Debdeep Mukhopadhyay,et al.  Progress in Cryptology -- INDOCRYPT 2014 , 2014, Lecture Notes in Computer Science.

[12]  Håvard Raddum,et al.  Solving Compressed Right Hand Side Equation Systems with Linear Absorption , 2012, SETA.

[13]  Stefan Lucks,et al.  Differential Cryptanalysis of Round-Reduced Simon and Speck , 2014, FSE.

[14]  Mohamed A. Sharaf,et al.  Databases Theory and Applications , 2014, Lecture Notes in Computer Science.

[15]  Keting Jia,et al.  Improved Differential Attacks on Reduced SIMON Versions , 2014, IACR Cryptol. ePrint Arch..

[16]  Lei Hu,et al.  Improved linear (hull) cryptanalysis of round-reduced versions of SIMON , 2015, Science China Information Sciences.