Advertisement

Impossible Differential Cryptanalysis of SPECK

  • Mingming Li
  • Jiansheng GuoEmail author
  • Jingyi Cui
  • Linhong Xu
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 960)

Abstract

The security of SPECK under impossible differential cryptanalysis is studied. Based on multiple 6-round impossible differential distinguishers and combined with the divide-and-conquer attack and time-and-memory tradeoff, the improved 10-round impossible differential cryptanalysis of SPECK32/64 and SPECK48/96 is presented by adding one round forward and three rounds backward. In addition, by further analyzing the properties of the differential diffusion of addition, many 7-round impossible differential distinguishers of SPECK families of block ciphers are constructed. And the 11-round impossible differential cryptanalysis of SPECK32/64 and SPECK48/96 is presented by adding one round forward and three rounds backward.

Keywords

Lightweight block cipher SPECK Impossible differential cryptanalysis Impossible differential distinguisher Addition 

Notes

Acknowledgments

Supported by the Foundation of Science and Technology on Information Assurance Laboratory (No. KJ-17-003).

References

  1. 1.
    Beaulieu, R., Shors, D., Smith, J., et al.: The SIMON and SPECK Families of Lightweight Block Ciphers. http://eprint.iacr.org/2013/404.pdf
  2. 2.
    Abed, F., List, E., Lucks, S.: Cryptanalysis of the SPECK Family of Block Ciphers. https://eprint.iacr.org/2013/568.pdf
  3. 3.
    Abed, F., List, E., Lucks, S., Wenzel, J.: Differential cryptanalysis of round-reduced Simon and Speck. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 525–545. Springer, Heidelberg (2015).  https://doi.org/10.1007/978-3-662-46706-0_27CrossRefGoogle Scholar
  4. 4.
    Biryukov, A., Roy, A., Velichkov, V.: Differential analysis of block ciphers SIMON and SPECK. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 546–570. Springer, Heidelberg (2015).  https://doi.org/10.1007/978-3-662-46706-0_28CrossRefGoogle Scholar
  5. 5.
    Dinur, I.: Improved differential cryptanalysis of round-reduced SPECK. In: Joux, A., Youssef, A. (eds.) SAC 2014. LNCS, vol. 8781, pp. 147–164. Springer, Cham (2014).  https://doi.org/10.1007/978-3-319-13051-4_9CrossRefGoogle Scholar
  6. 6.
    Yao, Y., Zhang, B., Wu, W.: Automatic search for linear trails of the SPECK family. In: Lopez, J., Mitchell, Chris J. (eds.) ISC 2015. LNCS, vol. 9290, pp. 158–176. Springer, Cham (2015).  https://doi.org/10.1007/978-3-319-23318-5_9CrossRefGoogle Scholar
  7. 7.
    Chen, Y.Q.: Zero correlation cryptanalysis of block cipher SPECK. Master thesis, Shandong University (2015)Google Scholar
  8. 8.
    Cui, T.T., Jia, K.T., Fu, K., Chen, S.Y., Wang M.Q.: New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations. http://eprint.iacr.org/2016/689.pdf
  9. 9.
    Biryukov, A., Velichkov, V., Le Corre, Y.: Automatic search for the best trails in ARX: application to block cipher Speck. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 289–310. Springer, Heidelberg (2016).  https://doi.org/10.1007/978-3-662-52993-5_15CrossRefGoogle Scholar
  10. 10.
    Fu, K., Wang, M.Q., Guo, Y.: MILP-based automatic search algorithms for differential and linear trails for SPECK. In: Peyrin, T. (ed.) Fast Software Encryption. LNCS, vol. 1267, pp. 268–288. Springer, Heidelberg (2016)CrossRefGoogle Scholar
  11. 11.
    Knudsen, L.R.: DEAL A 128-bit block cipher. Department of Informatics, Complexity (1998)Google Scholar
  12. 12.
    Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. J. Cryptol. 18(4), 291–311 (2005)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Lee, H.C., Kang, H.C., Hong, D., Sung, J., Hong, S.: New Impossible Differential Characteristic of SPECK64 Using MILP. https://eprint.iacr.org/2016/1137.pdf
  14. 14.
    Xu, H., Su, P.H., Qi, W.F.: Impossible differential cryptanalysis of reduced-round SPECK. J. Electron. Inf. Technol. 39(10), 2479–2486 (2017)Google Scholar
  15. 15.
    Li, M.M., Guo, J.S., C, J.Y., Xu,L.H.: Analysis of impossibledifferential characteristic forSPECK family of block ciphers. J.Cryptol. Res. 5(6), 631–640 (2018)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Mingming Li
    • 1
  • Jiansheng Guo
    • 1
    Email author
  • Jingyi Cui
    • 1
  • Linhong Xu
    • 1
  1. 1.Information Science and Technology InstituteZhengzhouChina

Personalised recommendations