Simon (cipher)

Simon
One round of Simon
General
DesignersRay Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers NSA
First published2013[1]
Related toSpeck
Cipher detail
Key sizes64, 72, 96, 128, 144, 192 or 256 bits
Block sizes32, 48, 64, 96 or 128 bits
StructureBalanced Feistel network
Rounds32, 36, 42, 44, 52, 54, 68, 69 or 72 (depending on block and key size)
Speed7.5 cpb (21.6 without SSE) on Intel Xeon 5640 (Simon128/128)
Best public cryptanalysis
Differential cryptanalysis can break 46 rounds of Simon128/128 with 2125.6 data, 240.6 bytes memory and time complexity of 2125.7 with success rate of 0.632.[2][3][4]

Simon is a family of lightweight block ciphers publicly released by the National Security Agency (NSA) in June 2013.[5][1] Simon has been optimized for performance in hardware implementations, while its sister algorithm, Speck, has been optimized for software implementations.[6][7]

The NSA began working on the Simon and Speck ciphers in 2011. The agency anticipated some agencies in the US federal government would need a cipher that would operate well on a diverse collection of Internet of Things devices while maintaining an acceptable level of security.[8]

Description of the cipher

The Simon block cipher is a balanced Feistel cipher with an n-bit word, and therefore the block length is 2n. The key length is a multiple of n by 2, 3, or 4, which is the value m. Therefore, a Simon cipher implementation is denoted as Simon2n/nm. For example, Simon64/128 refers to the cipher operating on a 64-bit plaintext block (n = 32) that uses a 128-bit key.[1] The block component of the cipher is uniform between the Simon implementations; however, the key generation logic is dependent on the implementation of 2, 3 or 4 keys.

Simon supports the following combinations of block sizes, key sizes and number of rounds:[1]

Block size (bits) Key size (bits) Rounds
32 64 32
48 72 36
96 36
64 96 42
128 44
96 96 52
144 54
128 128 68
192 69
256 72

Description of the key schedule

Let notate a left circular shift by bits.

The key schedule is mathematically described as

The key schedule structure may or may not be balanced. The key word count of is used to determine the structure of the key expansion, resulting in a total bit width of . The key word expansion consists of a right shift, XOR and a constant sequence, . The bit operates on the lowest bit of the key word once per round.[7]

Description of the constant sequence

The constant sequence, , is created by a Linear Feedback Shift Register (LFSR). The logical sequence of bit constants is set by the value of the key and block sizes. The LFSR is created by a 5-bit field. The constant bit operates on a key block once per round on the lowest bit in order to add non-key-dependent entropy to the key schedule. The LFSR has different logic for each sequence; however, the initial condition is the same for encryption. The initial condition of the LFSR for decryption varies on the round.

Constant Sequence

Cryptanalysis

The designers claim that Simon, though a "lightweight" cipher, is designed to have the full security possible for each block and key size, against standard chosen-plaintext (CPA) and chosen-ciphertext (CCA) attacks. Resistance against related-key attacks was also stated as a goal, though a less crucial one as attacks in that model are not relevant for typical use cases.[9]: 2  No effort was made to resist attacks in the known-key distinguishing attack model, nor did the designers evaluate Simon for use as a hash function.[10]

As of 2018, no successful attack on full-round Simon of any variant is known. Due to interest in Simon and Speck, about 70 cryptanalysis papers have been published on them.[9]: 10  As is typical for iterated ciphers, reduced-round variants have been successfully attacked. The best published attacks on Simon in the standard attack model (CPA/CCA with unknown key) are differential cryptanalysis attacks; these make it through about 70–75% of the rounds of most variants, though these best attacks are only marginally faster than brute-force.[11][12] [13][9]: 12  The design team states that while designing Simon, they found differential attacks to be the limiting attacks, i.e. the type of attack that makes it through the most rounds; they then set the number of rounds to leave a security margin similar to AES-128's at approximately 30%.[9]: 12–13 

Best known attacks on Simon (in standard attack model)
Variant Rounds attacked Time complexity Data complexity Attack type
Simon128/256 53/72 (74%) 2248 2127.6 Linear Hull[11]
Simon128/192 51/69 (74%) 2184 2127.6 Linear Hull[11]
Simon128/128 49/68 (72%) 2120 2127.6 Linear Hull[11]
Simon96/144 38/54 (70%) 2136 295.2 Linear Hull[11]
Simon96/96 37/52 (71%) 288 295.2 Linear Hull[11]
Simon64/128 31/44 (70%) 2120 263.5 Linear Hull[11]
Simon64/96 30/42 (71%) 288 263.5 Linear Hull[11]
Simon48/96 25/36 (69%) 280 247.9 Linear Hull[11]
Simon48/72 24/36 (67%) 256 247.9 Linear Hull[11]
Simon32/64 24/32 (75%) 263 232 Integral[12]

Simon has been criticized for having too small a security margin, i.e. too few rounds between the best attacks and the full cipher, in comparison to more conservative ciphers such as ChaCha20.[14] Ciphers with small security margins are more likely to be broken by future advances in cryptanalysis. Simon's design team counters that there is a real-world cost to unnecessarily large security margins, especially on lightweight devices, that cryptanalysis during the design phase allowed the number of rounds to be set appropriately, and that they targeted AES's security margin.[9]: 17 

Simon includes a round counter in the key schedule. The designers state this was included to block slide and rotational cryptanalysis attacks.[9]: 16  Still, rotational-XOR cryptanalysis has been used to find distinguishers against reduced-round versions of related ciphers like Speck.[15] Though the authors don't describe standard key-recovery attacks based on their distinguishers, their best distinguishers on Simon32 and Simon48 in the known-key distinguishing attack model for certain weak key classes make it through slightly more rounds than the best differential distinguishers. One of the authors has said that his research was resource-constrained and that rotational-XOR distinguishers on more rounds are probably possible. The designers also state that Simon was not designed to resist known-key distinguishing attacks (which do not directly compromise the confidentiality of ciphers).[10]: 8 

The designers state that NSA cryptanalysis found the algorithms to have no weaknesses, and security commensurate with their key lengths.[8]: 2  The design team says that their cryptanalysis included linear and differential cryptanalysis using standard techniques such as Matsui's algorithm and SAT/SMT solvers, though a full list of techniques used is not given.[9]: 10  Simon's designers have been criticized for not providing more details on NSA cryptanalysis of the ciphers.[16]

The NSA has approved Simon128/256 and Speck128/256 for use in U.S. National Security Systems, though AES-256 is still recommended for non-constrained applications.[17]

Standardization efforts and controversies

Initial attempts to standardise Simon and Speck failed to meet International Organization for Standardization super-majority required by the process and the ciphers were not adopted.[18][16] Expert delegates to the ISO from several countries including Germany, Japan and Israel opposed the efforts by the NSA to standardise the Simon and Speck ciphers, citing concerns that the NSA is pushing for their standardisation with knowledge of exploitable weaknesses in the ciphers. The position was based on partial evidence of weaknesses in the ciphers, lack of clear need for standardisation of the new ciphers, and the NSA's previous involvement in the creation and promotion of the backdoored Dual_EC_DRBG cryptographic algorithm.[19][20]

In response to concerns, the NSA stated that more than 70 security analysis papers from some of the world's leading cryptographers support NSA's conclusion that the algorithms are secure and NSA affirmed that it is not aware of any cryptanalytic techniques that would allow them or anyone else to exploit Simon or Speck.

After initial attempts to standardise the ciphers failed, the ISO standardised Simon and Speck in other working groups. As of October 2018, the Simon and Speck ciphers have been standardized by ISO as a part of the RFID air interface standard, International Standard ISO/29167-21 (for Simon) and International Standard ISO/29167-22 (for Speck), making them available for use by commercial entities.

See also

References

  1. ^ a b c d The Simon and Speck Families Of Lightweight Block Ciphers (PDF). ePrint. Retrieved 2016-06-16.
  2. ^ "Differential and Linear Cryptanalysis of Reduced-Round Simon". Retrieved 2014-04-16.
  3. ^ Abed, Farzaneh; List, Eik; Lucks, Stefan; Wenzel, Jakob (27 March 2014). Differential Cryptanalysis of Round-Reduced Simon and Speck (PDF). FSE 2014. conference slides. Bauhaus-Universität Weimar.
  4. ^ Alkhzaimi, Hoda; Lauridsen, Martin (28 Aug 2013), Cryptanalysis of the SIMON Family of Block Ciphers (PDF), International Association for Cryptologic Research (IACR) – via Cryptology ePrint Archive
  5. ^ Schneier, Bruce (July 2013). "SIMON and SPECK: New NSA Encryption Algorithms". Schneier on Security. Retrieved 2013-07-17.
  6. ^ Claire Swedberg (17 July 2015). "NSA Offers Block Ciphers to Help Secure RFID Transmissions". RFID Journal. Archived from the original on July 17, 2015.
  7. ^ a b Brian Degnan and Gregory Durgin (10 November 2017). "Simontool: Simulation Support for the Simon Cipher". IEEE Journal of Radio Frequency Identification. 1 (2): 195–201. Bibcode:2017IJRFI...1..195D. doi:10.1109/JRFID.2017.2771216. S2CID 37476795.
  8. ^ a b Beaulieu, Ray; Shors, Douglas; Smith, Jason; Treatman-Clark, Stefan; Weeks, Bryan; Winger, Louis. "Simon and Speck: Block Ciphers for the Internet of Things" (PDF). Retrieved 2017-11-23.
  9. ^ a b c d e f g "Notes on the design and analysis of Simon and Speck" (PDF). 2018-01-19. Retrieved 2018-06-13.
  10. ^ a b Beaulieu, Ray; Shors, Douglas; Smith, Jason; Treatman-Clark, Stefan; Weeks, Bryan; Wingers, Louis (2013-06-19). "The SIMON and SPECK Families of Lightweight Block Ciphers". Retrieved 2016-09-20.
  11. ^ a b c d e f g h i j Chen, Huaifeng; Wang, Xiaoyun (2018-01-19). "Improved Linear Hull Attack on Round-Reduced SIMON with Dynamic Key-guessing Techniques" (PDF). Retrieved 2018-06-13.
  12. ^ a b Chu, Zhihui; Chen, Huaifeng; Xiaoyun, Wang; Dong, Xiaoyang; Li, Lu (2018-01-19). "Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques". Security and Communication Networks. 2018: 5160237:1–5160237:11. doi:10.1155/2018/5160237.
  13. ^ Lee, HoChang; Kim, Seojin; Kang, HyungChul; Hong, Deukjo; Sung, Jaechul; Hong, Seokhie (February 2018). "Calculating the Approximate Probability of Differentials for ARX-Based Cipher Using SAT Solver". Journal of the Korea Institute of Information Security and Cryptology (in Korean). 28 (1): 15–24. doi:10.13089/JKIISC.2018.28.1.15.
  14. ^ Bernstein, Daniel J. [@hashbreaker] (2016-04-12). "NSA claims that having 70% of Simon+Speck broken is ok" (Tweet). Retrieved 2018-06-13 – via Twitter.
  15. ^ Liu, Yunwen; De Witte, Glenn; Ranea, Adrián; Ashur, Tomer (2017). "Rotational-XOR Cryptanalysis of Reduced-round SPECK" (PDF). Retrieved 2018-06-13.
  16. ^ a b Ashur, Tomer. "[PATCH v2 0/5] crypto: Speck support".
  17. ^ National Security Agency (2016-11-18). "Algorithms to Support the Evolution of Information Assurance Needs".
  18. ^ Insights an reasons why Speck and Simon have been rejected from ISO standardization
  19. ^ "Distrustful U.S. allies force spy agency to back down in encryption fight". Reuters. 2017-09-21.
  20. ^ Ashur, Tomer; Luykx, Atul (2021-01-15). "An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families". In Avoine, Gildas; Hernandez-Castro, Julio (eds.). Security of Ubiquitous Computing Systems. Springer. pp. 63–78. doi:10.1007/978-3-030-10591-4_4. ISBN 978-3-030-10590-7. S2CID 234119694.

Read other articles:

Matthew Upson Informasi pribadiNama lengkap Matthew James UpsonTanggal lahir 18 April 1979 (umur 44)Tempat lahir Hartismere, Eye, Suffolk, InggrisTinggi 1,85 m (6 ft 1 in)[1]Posisi bermain Bek TengahKarier junior Ipswich Town1994–1996 Luton TownKarier senior*Tahun Tim Tampil (Gol)1996–1997 Luton Town 1 (0)1997–2003 Arsenal 35 (0)2000 → Nottingham Forest (pinjaman) 1 (0)2001 → Crystal Palace (pinjaman) 7 (0)2002 → Reading (pinjaman) 14 (0)2003–2007 Bi...

 

2023 single by Peter GabrielThe CourtSingle by Peter Gabrielfrom the album I/O Released 5 February 2023 (dark-side mix) 20 February 2023 (bright-side and in-side mixes) Studio Real World (Wiltshire) The Beehive (London) British Grove (London) Length4:20Label Real World EMI (UK/Japan) Republic (United States/Canada) Songwriter(s)Peter GabrielProducer(s)Peter GabrielPeter Gabriel singles chronology Panopticom (2023) The Court (2023) Playing for Time (2023) The Court is a song by English musicia...

 

German cross-country skier This article includes a list of general references, but it lacks sufficient corresponding inline citations. Please help to improve this article by introducing more precise citations. (January 2014) (Learn how and when to remove this template message) Denise HerrmannHerrmann in 2018Personal informationNationalityGermanBorn (1988-12-20) 20 December 1988 (age 35)Schlema, East GermanyHeight1.75 m (5 ft 9 in)Professional informationClubWSC Erzgebirge ...

Persona 5 character Fictional character JokerPersona characterJoker in his school (left) and Phantom Thief (right) attiresFirst appearancePersona 5 (2016)Last appearancePersona 5 Tactica (2023)Designed byShigenori SoejimaPortrayed byHiroki Ino (stage play)Voiced byJP: Jun FukuyamaEN: Xander MobusIn-universe informationFull nameRen AmamiyaGenderMaleAffiliationPhantom Thieves of HeartsWeaponPersona, dagger, handgunNationalityJapanese Joker[a] is the protagonist of Persona 5, a 2016 role...

 

مطبخ نمساويمعلومات عامةالبلد / المنطقة النمسا النوع مطبخ وطني صنف فرعي مطبخ أوروبي الثقافة culture of Austria (en) أطباق مشهورة Chicken paprikash (en) تعديل - تعديل مصدري - تعديل ويكي بيانات يتميز المطبخ النمساوي بأنه يجمع بين أذواق البلاد المجاورة مثل إيطاليا والمجر ,ألمانيا ويوغوسلافيا. فقد ...

 

Orbital-orbital molekul dan atom elektron Dalam fisika atom dan kimia kuantum, konfigurasi elektron adalah susunan elektron-elektron pada sebuah atom, molekul, atau struktur fisik lainnya.[1] Sama seperti partikel elementer lainnya, elektron patuh pada hukum mekanika kuantum dan menampilkan sifat-sifat bak-partikel maupun bak-gelombang. Secara formal, keadaan kuantum elektron tertentu ditentukan oleh fungsi gelombangnya, yaitu sebuah fungsi ruang dan waktu yang bernilai kompleks. Menu...

Resolusi 555Dewan Keamanan PBBZona UNIFIL, bersama dengan UNDOFTanggal12 Oktober 1984Sidang no.2.559KodeS/RES/555 (Dokumen)TopikIsrael–LebanonRingkasan hasil13 mendukungTidak ada menentang2 abstainHasilDiadopsiKomposisi Dewan KeamananAnggota tetap Tiongkok Prancis Britania Raya Amerika Serikat Uni SovietAnggota tidak tetap Burkina Faso Mesir India Malta Nikaragua Belanda Pakistan Peru RSS Ukraina Zimbabwe R...

 

Protected area in Victoria, AustraliaGreater Bendigo National ParkVictoriaIUCN category II (national park) Notley camping area, Greater Bendigo National Park.Greater Bendigo National ParkNearest town or cityBendigoCoordinates36°40′26″S 144°15′17″E / 36.67389°S 144.25472°E / -36.67389; 144.25472Established30 October 2002 (2002-10-30)[1]Area170 km2 (65.6 sq mi)[1]Managing authoritiesParks VictoriaWebsiteGreater B...

 

For the asteroid named after Nikolaus Lenau, see 7400 Lenau. Austrian poet Lenau in 1839 Nikolaus Lenau was the pen name of Nikolaus Franz Niembsch Edler von Strehlenau (13 August 1802 – 22 August 1850), a German-language Austrian poet. Biography Lenau's Grave in Weidling, Austria He was born at Csatád (Schadat), Kingdom of Hungary, now Lenauheim, Banat, then part of the Habsburg monarchy, now in Romania. His father, a Habsburg government official, died in 1807 in Budapest, leaving his chi...

Artikel ini bukan mengenai Partai NasDem. Untuk kegunaan lain, lihat Partai Nasional Demokrat. Partai Nasional Demokrat Ketua umumEdwin Henawan SoekowatiSekretaris JenderalEddy SjafuanDibentuk12 Juni 1998Dipisah dariPDIKantor pusatJl Tebet Utara III No 9 Jakarta Selatan 12820IdeologiPancasilaKursi di DPR0Politik IndonesiaPartai politikPemilihan umum Partai Nasional Demokrat (PND) adalah sebuah partai politik di Indonesia yang didirikan pada tanggal 12 Juni 1998 oleh anggota Pemuda Demokr...

 

周處除三害The Pig, The Snake and The Pigeon正式版海報基本资料导演黃精甫监制李烈黃江豐動作指導洪昰顥编剧黃精甫主演阮經天袁富華陳以文王淨李李仁謝瓊煖配乐盧律銘林孝親林思妤保卜摄影王金城剪辑黃精甫林雍益制片商一種態度電影股份有限公司片长134分鐘产地 臺灣语言國語粵語台語上映及发行上映日期 2023年10月6日 (2023-10-06)(台灣) 2023年11月2日 (2023-11-02)(香�...

 

Iranian cyclist (born 1985) Samad PourseyediPourseyedi during 2016 Summer OlympicsPersonal informationFull nameMirsamad Pourseyedi GolakhourBorn (1985-10-15) October 15, 1985 (age 38)Tabriz, Iran[1]Team informationCurrent teamMes Sungun–AzadDisciplineRoadRoleRiderRider typeClimberProfessional teams2008–2009Islamic Azad University Cycling Team2009–2010Tabriz Petrochemical Team2011Azad University Iran2013–2015Tabriz Petrochemical Team2016–2017Tabriz Shahrda...

土库曼斯坦总统土库曼斯坦国徽土库曼斯坦总统旗現任谢尔达尔·别尔德穆哈梅多夫自2022年3月19日官邸阿什哈巴德总统府(Oguzkhan Presidential Palace)機關所在地阿什哈巴德任命者直接选举任期7年,可连选连任首任萨帕尔穆拉特·尼亚佐夫设立1991年10月27日 土库曼斯坦土库曼斯坦政府与政治 国家政府 土库曼斯坦宪法 国旗 国徽 国歌 立法機關(英语:National Council of Turkmenistan) ...

 

Ken Hung洪卓立Informasi latar belakangNama lahirKen Hung Cheuk Lap (洪卓立)Lahir2 Maret 1987 (umur 37)Asal Hong KongGenreCantopopPekerjaanPenyanyiInstrumenVokalTahun aktif2007 - sekarangLabelEmperor Entertainment GroupSitus webSitus di Ken Hung pada EEG Ken Hung Cheuk Lap (Hanzi tradisional: 洪卓立, Kantonis: hung4 coek3 laap6, Pinyin: hong2 zhuo1 li4; lahir 2 Maret 1987) adalah penyanyi berkebangsaan Hong Kong. Dia dikenal sebagai penyanyi untuk Cantopop. Karier solo di dunia r...

 

Village in County Tipperary, Ireland Village in Munster, IrelandBallyporeen Béal Átha PóirinVillageThe R665 through Ballyporeen, once part of the main Dublin - Cork coach road.BallyporeenLocation in IrelandCoordinates: 52°16′12″N 8°06′00″W / 52.26994°N 8.10001°W / 52.26994; -8.10001CountryIrelandProvinceMunsterCountyCounty TipperaryDáil ÉireannTipperaryElevation82 m (269 ft)Population (2016)[1]318Dialing code0 52, +000 353 (0)52I...

UK pro-Brexit political pressure group Leave Means LeaveFormationJuly 2016 (2016-07)FoundersRichard Tice, John LongworthDissolved31 January 2020PurposeUnited Kingdom withdrawal from the European UnionHeadquarters55 Tufton Street, LondonRegion served United KingdomKey peopleRichard Tice (Co-Chairman)[1]John Longworth (Co-Chairman)[2]Nigel Farage (Vice Chairman)Owen Paterson MP[3]Sir Gerald HowarthPeter Bone MPSimon HefferDavid Campbell BannermanWebsiteleavemea...

 

This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Variations Andrew Lloyd Webber album – news · newspapers · books · scholar · JSTOR (May 2010) (Learn how and when to remove this message) 1978 studio album by Andrew and Julian Lloyd WebberVariationsStudio album by Andrew and Julian Lloyd WebberRe...

 

The following is an incomplete list of works by Artemisia Gentileschi. Catalogue numbers abbreviated WB are taken from the 1999 publication by Raymond Ward Bissell,[1] and number abbreviated MET are from the 2001 publication by the Metropolitan Museum of Art. Other attributions are taken from Jesse Locker's The Language of Painting.[2][3] Further references are available on the Bibliography on Artemisia Gentileschi. image name year collection dimensions inventory nr. ...

Vehicle modified or purposely built with extremely large wheels and suspension This article is about the type of truck. For other uses, see Monster Truck (disambiguation). This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Monster truck – news · newspapers · books · scholar · JSTOR (February 2019) (Learn how an...

 

Mythical character Birth of Heracles by Jean Jacques Francois Le Barbier. In Greek mythology, Galanthis or Galinthias (Ancient Greek: Γαλανθίς/Γαλινθιάς, romanized: Galanthís/Galinthiás) was the woman who interfered with Hera's plan to hinder the birth of Heracles in favor of Eurystheus, and was changed into a weasel or cat as punishment for being so insolent as to deceive the goddesses of birth that were acting on Hera's behalf. Mythology Ovid's account In the version...