Skip to main content

Impossible Differential Cryptanalysis of SPECK

  • Conference paper
  • First Online:
Trusted Computing and Information Security (CTCIS 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 960))

Included in the following conference series:

Abstract

The security of SPECK under impossible differential cryptanalysis is studied. Based on multiple 6-round impossible differential distinguishers and combined with the divide-and-conquer attack and time-and-memory tradeoff, the improved 10-round impossible differential cryptanalysis of SPECK32/64 and SPECK48/96 is presented by adding one round forward and three rounds backward. In addition, by further analyzing the properties of the differential diffusion of addition, many 7-round impossible differential distinguishers of SPECK families of block ciphers are constructed. And the 11-round impossible differential cryptanalysis of SPECK32/64 and SPECK48/96 is presented by adding one round forward and three rounds backward.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Beaulieu, R., Shors, D., Smith, J., et al.: The SIMON and SPECK Families of Lightweight Block Ciphers. http://eprint.iacr.org/2013/404.pdf

  2. Abed, F., List, E., Lucks, S.: Cryptanalysis of the SPECK Family of Block Ciphers. https://eprint.iacr.org/2013/568.pdf

  3. Abed, F., List, E., Lucks, S., Wenzel, J.: Differential cryptanalysis of round-reduced Simon and Speck. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 525–545. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-46706-0_27

    Chapter  Google Scholar 

  4. Biryukov, A., Roy, A., Velichkov, V.: Differential analysis of block ciphers SIMON and SPECK. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 546–570. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-46706-0_28

    Chapter  Google Scholar 

  5. Dinur, I.: Improved differential cryptanalysis of round-reduced SPECK. In: Joux, A., Youssef, A. (eds.) SAC 2014. LNCS, vol. 8781, pp. 147–164. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-13051-4_9

    Chapter  Google Scholar 

  6. Yao, Y., Zhang, B., Wu, W.: Automatic search for linear trails of the SPECK family. In: Lopez, J., Mitchell, Chris J. (eds.) ISC 2015. LNCS, vol. 9290, pp. 158–176. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-23318-5_9

    Chapter  Google Scholar 

  7. Chen, Y.Q.: Zero correlation cryptanalysis of block cipher SPECK. Master thesis, Shandong University (2015)

    Google Scholar 

  8. Cui, T.T., Jia, K.T., Fu, K., Chen, S.Y., Wang M.Q.: New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations. http://eprint.iacr.org/2016/689.pdf

  9. Biryukov, A., Velichkov, V., Le Corre, Y.: Automatic search for the best trails in ARX: application to block cipher Speck. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 289–310. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-52993-5_15

    Chapter  Google Scholar 

  10. Fu, K., Wang, M.Q., Guo, Y.: MILP-based automatic search algorithms for differential and linear trails for SPECK. In: Peyrin, T. (ed.) Fast Software Encryption. LNCS, vol. 1267, pp. 268–288. Springer, Heidelberg (2016)

    Chapter  Google Scholar 

  11. Knudsen, L.R.: DEAL A 128-bit block cipher. Department of Informatics, Complexity (1998)

    Google Scholar 

  12. Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. J. Cryptol. 18(4), 291–311 (2005)

    Article  MathSciNet  Google Scholar 

  13. Lee, H.C., Kang, H.C., Hong, D., Sung, J., Hong, S.: New Impossible Differential Characteristic of SPECK64 Using MILP. https://eprint.iacr.org/2016/1137.pdf

  14. Xu, H., Su, P.H., Qi, W.F.: Impossible differential cryptanalysis of reduced-round SPECK. J. Electron. Inf. Technol. 39(10), 2479–2486 (2017)

    Google Scholar 

  15. Li, M.M., Guo, J.S., C, J.Y., Xu,L.H.: Analysis of impossibledifferential characteristic forSPECK family of block ciphers. J.Cryptol. Res. 5(6), 631–640 (2018)

    Google Scholar 

Download references

Acknowledgments

Supported by the Foundation of Science and Technology on Information Assurance Laboratory (No. KJ-17-003).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiansheng Guo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, M., Guo, J., Cui, J., Xu, L. (2019). Impossible Differential Cryptanalysis of SPECK. In: Zhang, H., Zhao, B., Yan, F. (eds) Trusted Computing and Information Security. CTCIS 2018. Communications in Computer and Information Science, vol 960. Springer, Singapore. https://doi.org/10.1007/978-981-13-5913-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-5913-2_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-5912-5

  • Online ISBN: 978-981-13-5913-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics