搜索结果: 1-15 共查到“密码学 Simon”相关记录40条 . 查询时间(0.076 秒)
Breaking Tweakable Enciphering Schemes using Simon's Algorithm
TES Simon's algorithm Quantum period finding algorithm
2019/6/19
The threat of the possible advent of quantum computers has motivated the cryptographic community to search for quantum safe solutions. There have been some works in past few years showing the vulnerab...
Quantum Attacks without Superposition Queries: the Offline Simon Algorithm
Simon's algorithm classical queries symmetric cryptography
2019/6/4
In symmetric cryptanalysis, the model of superposition queries has lead to surprising results, with many constructions being broken in polynomial time thanks to Simon's period-finding algorithm. But t...
This paper presents the results of a new approach to the cryptanalysis of SIMON-32/6432/64, a cipher published by NSA in 2013. Our cryptanalysis essentially considers combinatorial properties. These p...
SIMON and SPECK families of block ciphers are well-known lightweight ciphers designed by NSA. In this note, based on the previous investigations on SIMON, a closed formula for the squared correlations...
Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64
Correlated sequences Simon Simeck
2018/8/2
In this paper, we propose a novel cryptanalytic technique called correlated sequence attack on block ciphers. Our attack exploits the properties of given key dependent sequences of length tt to obtain...
Related-Key Linear Cryptanalysis on SIMON
related-key attack linear cryptanalysis linear key schedule
2018/3/7
We present a general framework of the related-key linear attack that can be applied to a class of block ciphers including the key-alternating iterative ones with linear or affine key schedules. In con...
The distinguishing attack on Speck, Simon, Simeck, HIGHT and LEA
secret-key cryptography HIGHT
2018/1/15
The purpose of the work is to estimate the resistance of lightweight block ciphers Speck, Simon, Simeck, HIGHT, LEA to a distinguishing attack. (This attack is a form of cryptanalysis on data encrypte...
In the present paper, we analyze the security of SIMON-like ciphers against linear cryptanalysis. First, an upper bound is derived on the squared correlation of SIMON-like round function. It is shown ...
We discuss the design rationale and analysis of the SIMON and SPECK lightweight block ciphers.
Grover Meets Simon - Quantumly Attacking the FX-construction
symmetric cryptography quantum attacks Grover's algorithm
2017/5/23
Using whitening keys is a well understood mean of increasing the key-length of any given cipher. Especially as it is known ever since Grover's seminal work that the effective key-length is reduced by ...
A General Degenerate Grouping Power Attack with Specific Application to SIMON and SPECK
SIMON SPECK FPGA
2017/5/5
A Degenerate Grouping Power Attack (DGPA) is a type of Partitioning Power Analysis (PPA) used to extract secret keys from the power sidechannel signal of an encryption algorithm running on a device al...
Optimal Differential Trails in SIMON-like Ciphers
automatic search differential trail SIMON
2017/2/28
In the present paper, we propose an automatic search algorithm for optimal differential trails in SIMON-like ciphers. First, we give a more accurate upper bound on the differential probability of SIMO...
Pen and Paper Arguments for SIMON and SIMON-like Designs
SIMON Simeck differential cryptanalysis
2016/6/27
In this work, we analyze the resistance of \textsc{Simon}-like ciphers against differential attacks without using computer-aided methods. In this context, we first define the notion of a \textsc{Simon...
On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants
SIMON Lightweight block cipher Integral attack
2016/6/20
SIMON is a lightweight block cipher designed by NSA in 2013. NSA presented the specification and the implementation efficiency, but they did not provide detailed security analysis nor the design ratio...
Bit-Based Division Property and Application to Simon Family
secret-key cryptography cryptanalysis
2016/3/16
Ciphers that do not use S-boxes have been discussed for the demand on lightweight
cryptosystems, and their round functions consist of and, rotation, and xor. Especially, the
Simon family is one of t...