跳到主要导航 跳到搜索 跳到主要内容

Improved differential attack on 30-round SIMON64

  • Gaoli Wang*
  • , Nan Gan
  • , Yue Li
  • *此作品的通讯作者

科研成果: 期刊稿件文章同行评审

摘要

In this paper we present an attack on 30-round SIMON64, which improves the best results on SIMON64 by 1 round. We use a 23-round differential characteristic which was proposed by Itai et al in 2015 to construct a 30-round extended differential characteristized by adding 4 rounds on the top and 3 round on the bottom. Furthermore, we utilize all of the sufficient bit-conditions of the 30-round differential to compute a set of corresponding subkeys. Then we distribute the plaintext pairs over the 286 lists corresponding to the 86-bit subkeys. If a list contains two or more pairs, we regard the subkeys corresponding to the list as candidate subkeys. The time complexity of our attack on 30-round SIMON64/96 (SIMON64/128) is 286.2 (2118.2) with a success probability of 0.61, while the data complexity and the memory complexity are 263.3 and 290 bytes, respectively.

源语言英语
页(从-至)75-83
页数9
期刊Wuhan University Journal of Natural Sciences
21
1
DOI
出版状态已出版 - 1 2月 2016
已对外发布

指纹

探究 'Improved differential attack on 30-round SIMON64' 的科研主题。它们共同构成独一无二的指纹。

引用此