2018
DOI: 10.1049/iet-ifs.2016.0590
|View full text |Cite
|
Sign up to set email alerts
|

Improved zero‐correlation and impossible differential cryptanalysis of reduced‐round SIMECK block cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 25 publications
0
10
0
Order By: Relevance
“…The longest impossible differentials include 11/12/13/16/19 rounds for SIMON32/48/64/96/128, respectively; and 11/13/15 for SIMECK32/48/64, respectively. While in Sadeghi and Bagheri (2018) gave 15-round and 17-round impossible differential characteristics for SIMECK48 and SIMECK64 respectively by manually finding the contradiction between two truncated differentials.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…The longest impossible differentials include 11/12/13/16/19 rounds for SIMON32/48/64/96/128, respectively; and 11/13/15 for SIMECK32/48/64, respectively. While in Sadeghi and Bagheri (2018) gave 15-round and 17-round impossible differential characteristics for SIMECK48 and SIMECK64 respectively by manually finding the contradiction between two truncated differentials.…”
Section: Related Workmentioning
confidence: 99%
“…It is unadaptable for SIMON-like block ciphers searching impossible differentials by MILP until Wang et al provided an accurate MILP model for SIMON-like block ciphers in Wang et al (2018). They gave impossible differentials of 15-round for SIMECK48 and 17-round for SIMECK64 meeting the result in Sadeghi and Bagheri (2018), and two new 13-round for SIMON64. Leander et al proposed invariant subspace attack for PRINTcipher in Leander et al (2011).…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…They found that a 14-round related-key differential distinguisher for Simeck32/64 is the best known method, and they used the dependencies of bitwise AND operations. Sadeghi and Bagheri [10] proposed an improved miss-in-the-middle approach to find zero-correlation linear distinguishers and impossible differentials on Simeck48 and Simeck64. They attacked 15-round Simeck48 and 17-round Simeck64 using their proposed zero-correlation linear approximation method which relies on the duality of the zero-correlation and impossible differential, and they attacked 27-round Simeck48 and 31-round Simeck64 based on their proposed zero-correlation linear distinguishers.…”
Section: Simeck Family Blockmentioning
confidence: 99%