Improved Integral Attack on Reduced-Round Simeck

被引:7
|
作者
Li, Hang [1 ]
Ren, Jiongjiong [1 ]
Chen, Shaozhen [1 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Henan, Peoples R China
关键词
Cryptanalysis; lightweight block cipher; Simeck; integral attack; equivalent-subkey;
D O I
10.1109/ACCESS.2019.2936834
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Simeck, a family of lightweight block ciphers utilizing Simon-like structure, is widely used under resource constrained environment. So far, many cryptanalysis methods have been used to attack Simeck. In this paper, we give the new results of integral cryptanalysis on reduced-round Simeck. First, the exact algebraic degree of Simeck32 is given by parallel computing, and then the 13-round theoretical integral distinguisher is proposed to attack 20-round Simeck32(64). Besides, by using the equivalent-subkey and partial-sum technology, combined with the meet-in-the-middle strategy and subkey relationship, the 22-round Simeck32(64) integral attack is first proposed based on the 15-round integral distinguisher. Furthermore, based on 18-round and 21-round integral distinguishers, the new integral attacks on 26-round Simeck48(96) and 30-round Simeck64(128) are proposed, respectively. These new attacks greatly improve the results of the previous integral attacks for Simeck.
引用
收藏
页码:118806 / 118814
页数:9
相关论文
共 50 条
  • [21] Rebound Attack on Reduced-Round Versions of JH
    Rijmen, Vincent
    Toz, Deniz
    Varici, Kerem
    FAST SOFTWARE ENCRYPTION, 2010, 6147 : 286 - 303
  • [22] Square attack on reduced-round Zodiac cipher
    Ji, Wen
    Hu, Lei
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2008, 4991 : 377 - 391
  • [23] Integral Cryptanalysis of Reduced-Round Tweakable TWINE
    ElSheikh, Muhammad
    Youssef, Amr M.
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2020, 2020, 12579 : 485 - 504
  • [24] Amplified boomerang attack against reduced-round SHACAL
    Kim, J
    Moon, D
    Lee, W
    Hong, S
    Lee, S
    Jung, S
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 243 - 253
  • [25] The Retracing Boomerang Attack, with Application to Reduced-Round AES
    Dunkelman, Orr
    Keller, Nathan
    Ronen, Eyal
    Shamir, Adi
    JOURNAL OF CRYPTOLOGY, 2024, 37 (03)
  • [26] Improved meet-in-the-middle attack on reduced-round Kiasu-BC algorithm
    Li M.
    Chen S.
    Tongxin Xuebao/Journal on Communications, 2022, 43 (07): : 41 - 48
  • [27] A meet-in-the-middle attack on reduced-round ARIA
    Tang, Xuehai
    Sun, Bing
    Li, Ruilin
    Li, Chao
    Yin, Juhua
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (10) : 1685 - 1692
  • [28] Cube Attack on Reduced-Round Enhanced-Bivium
    Zhang, Shiyong
    Chen, Gongliang
    Li, Jianhua
    2016 INTERNATIONAL CONFERENCE ON SECURITY OF SMART CITIES, INDUSTRIAL CONTROL SYSTEM AND COMMUNICATIONS (SSIC), 2016,
  • [29] Improved attacks against reduced-round Whirlwind
    Wei, Congming
    Dong, Bingyou
    Hua, Jialiang
    Dong, Xiaoyang
    Zhang, Guoyan
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (11) : 3581 - 3602
  • [30] Improved attacks against reduced-round Whirlwind
    Congming Wei
    Bingyou Dong
    Jialiang Hua
    Xiaoyang Dong
    Guoyan Zhang
    Designs, Codes and Cryptography, 2023, 91 : 3581 - 3602