摘要
In this paper we present an attack on 30-round SIMON64, which improves the best results on SIMON64 by 1 round. We use a 23-round differential characteristic which was proposed by Itai et al in 2015 to construct a 30-round extended differential characteristized by adding 4 rounds on the top and 3 round on the bottom. Furthermore, we utilize all of the sufficient bit-conditions of the 30-round differential to compute a set of corresponding subkeys. Then we distribute the plaintext pairs over the 286 lists corresponding to the 86-bit subkeys. If a list contains two or more pairs, we regard the subkeys corresponding to the list as candidate subkeys. The time complexity of our attack on 30-round SIMON64/96 (SIMON64/128) is 286.2 (2118.2) with a success probability of 0.61, while the data complexity and the memory complexity are 263.3 and 290 bytes, respectively.
| 源语言 | 英语 |
|---|---|
| 页(从-至) | 75-83 |
| 页数 | 9 |
| 期刊 | Wuhan University Journal of Natural Sciences |
| 卷 | 21 |
| 期 | 1 |
| DOI | |
| 出版状态 | 已出版 - 1 2月 2016 |
| 已对外发布 | 是 |
指纹
探究 'Improved differential attack on 30-round SIMON64' 的科研主题。它们共同构成独一无二的指纹。引用此
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver