Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things Devices

In this paper, we focus on differential cryptanalysis of a lightweight ARX cipher. These ciphers use three simple arithmetic operations, namely, modular addition, bitwise rotation, and exclusive-OR, and therefore, are designed very well to perform over the Internet-of-Things (IoT) devices. We choose...

Full description

Bibliographic Details
Main Authors: Ashutosh Dhar Dwivedi, Pawel Morawiecki, Gautam Srivastava
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8624250/
_version_ 1828966968980406272
author Ashutosh Dhar Dwivedi
Pawel Morawiecki
Gautam Srivastava
author_facet Ashutosh Dhar Dwivedi
Pawel Morawiecki
Gautam Srivastava
author_sort Ashutosh Dhar Dwivedi
collection DOAJ
description In this paper, we focus on differential cryptanalysis of a lightweight ARX cipher. These ciphers use three simple arithmetic operations, namely, modular addition, bitwise rotation, and exclusive-OR, and therefore, are designed very well to perform over the Internet-of-Things (IoT) devices. We choose a very well-known ARX cipher designed by the National Security Agency (NSA) of the United States of America in June 2013, named SPECK. SPECK was subjected to several years of detailed cryptanalytic analysis within NSA and has been subjected to academic analysis by researchers worldwide. SPECK is specially optimized for low-cost processors like those used in the IoT devices. We first find the differential paths for all the variants of SPECK, and based on that differential path, we attack the round-reduced variant of the cipher. Finding differential paths in ARX is one of the most difficult and time-consuming problems due to the huge state space. We use a nested-based heuristic technique to find a differential path which is inspired by the nested Monte Carlo search (NMCS) algorithm. NMCS was successfully applied before for different games: Morpion Solitaire, SameGame, and 16 × 16 Sudoku, but the use of such heuristic techniques in cryptography is entirely new and time-saving.
first_indexed 2024-12-14T11:42:16Z
format Article
id doaj.art-aaaddc31e57241629a4b337c3710207e
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-14T11:42:16Z
publishDate 2019-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-aaaddc31e57241629a4b337c3710207e2022-12-21T23:02:46ZengIEEEIEEE Access2169-35362019-01-017164761648610.1109/ACCESS.2019.28943378624250Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things DevicesAshutosh Dhar Dwivedi0Pawel Morawiecki1Gautam Srivastava2https://orcid.org/0000-0001-9851-4103Polish Academy of Sciences, Institute of Computer Science, Warsaw, PolandPolish Academy of Sciences, Institute of Computer Science, Warsaw, PolandDepartment of Mathematics and Computer Science, Brandon University, Brandon, CanadaIn this paper, we focus on differential cryptanalysis of a lightweight ARX cipher. These ciphers use three simple arithmetic operations, namely, modular addition, bitwise rotation, and exclusive-OR, and therefore, are designed very well to perform over the Internet-of-Things (IoT) devices. We choose a very well-known ARX cipher designed by the National Security Agency (NSA) of the United States of America in June 2013, named SPECK. SPECK was subjected to several years of detailed cryptanalytic analysis within NSA and has been subjected to academic analysis by researchers worldwide. SPECK is specially optimized for low-cost processors like those used in the IoT devices. We first find the differential paths for all the variants of SPECK, and based on that differential path, we attack the round-reduced variant of the cipher. Finding differential paths in ARX is one of the most difficult and time-consuming problems due to the huge state space. We use a nested-based heuristic technique to find a differential path which is inspired by the nested Monte Carlo search (NMCS) algorithm. NMCS was successfully applied before for different games: Morpion Solitaire, SameGame, and 16 × 16 Sudoku, but the use of such heuristic techniques in cryptography is entirely new and time-saving.https://ieeexplore.ieee.org/document/8624250/Differential pathARX ciphersnested Monte-Carlo searchIoT ciphersdifferential cryptanalysisSPECK
spellingShingle Ashutosh Dhar Dwivedi
Pawel Morawiecki
Gautam Srivastava
Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things Devices
IEEE Access
Differential path
ARX ciphers
nested Monte-Carlo search
IoT ciphers
differential cryptanalysis
SPECK
title Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things Devices
title_full Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things Devices
title_fullStr Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things Devices
title_full_unstemmed Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things Devices
title_short Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things Devices
title_sort differential cryptanalysis of round reduced speck suitable for internet of things devices
topic Differential path
ARX ciphers
nested Monte-Carlo search
IoT ciphers
differential cryptanalysis
SPECK
url https://ieeexplore.ieee.org/document/8624250/
work_keys_str_mv AT ashutoshdhardwivedi differentialcryptanalysisofroundreducedspecksuitableforinternetofthingsdevices
AT pawelmorawiecki differentialcryptanalysisofroundreducedspecksuitableforinternetofthingsdevices
AT gautamsrivastava differentialcryptanalysisofroundreducedspecksuitableforinternetofthingsdevices