Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things Devices
In this paper, we focus on differential cryptanalysis of a lightweight ARX cipher. These ciphers use three simple arithmetic operations, namely, modular addition, bitwise rotation, and exclusive-OR, and therefore, are designed very well to perform over the Internet-of-Things (IoT) devices. We choose...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8624250/ |
_version_ | 1828966968980406272 |
---|---|
author | Ashutosh Dhar Dwivedi Pawel Morawiecki Gautam Srivastava |
author_facet | Ashutosh Dhar Dwivedi Pawel Morawiecki Gautam Srivastava |
author_sort | Ashutosh Dhar Dwivedi |
collection | DOAJ |
description | In this paper, we focus on differential cryptanalysis of a lightweight ARX cipher. These ciphers use three simple arithmetic operations, namely, modular addition, bitwise rotation, and exclusive-OR, and therefore, are designed very well to perform over the Internet-of-Things (IoT) devices. We choose a very well-known ARX cipher designed by the National Security Agency (NSA) of the United States of America in June 2013, named SPECK. SPECK was subjected to several years of detailed cryptanalytic analysis within NSA and has been subjected to academic analysis by researchers worldwide. SPECK is specially optimized for low-cost processors like those used in the IoT devices. We first find the differential paths for all the variants of SPECK, and based on that differential path, we attack the round-reduced variant of the cipher. Finding differential paths in ARX is one of the most difficult and time-consuming problems due to the huge state space. We use a nested-based heuristic technique to find a differential path which is inspired by the nested Monte Carlo search (NMCS) algorithm. NMCS was successfully applied before for different games: Morpion Solitaire, SameGame, and 16 × 16 Sudoku, but the use of such heuristic techniques in cryptography is entirely new and time-saving. |
first_indexed | 2024-12-14T11:42:16Z |
format | Article |
id | doaj.art-aaaddc31e57241629a4b337c3710207e |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-14T11:42:16Z |
publishDate | 2019-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-aaaddc31e57241629a4b337c3710207e2022-12-21T23:02:46ZengIEEEIEEE Access2169-35362019-01-017164761648610.1109/ACCESS.2019.28943378624250Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things DevicesAshutosh Dhar Dwivedi0Pawel Morawiecki1Gautam Srivastava2https://orcid.org/0000-0001-9851-4103Polish Academy of Sciences, Institute of Computer Science, Warsaw, PolandPolish Academy of Sciences, Institute of Computer Science, Warsaw, PolandDepartment of Mathematics and Computer Science, Brandon University, Brandon, CanadaIn this paper, we focus on differential cryptanalysis of a lightweight ARX cipher. These ciphers use three simple arithmetic operations, namely, modular addition, bitwise rotation, and exclusive-OR, and therefore, are designed very well to perform over the Internet-of-Things (IoT) devices. We choose a very well-known ARX cipher designed by the National Security Agency (NSA) of the United States of America in June 2013, named SPECK. SPECK was subjected to several years of detailed cryptanalytic analysis within NSA and has been subjected to academic analysis by researchers worldwide. SPECK is specially optimized for low-cost processors like those used in the IoT devices. We first find the differential paths for all the variants of SPECK, and based on that differential path, we attack the round-reduced variant of the cipher. Finding differential paths in ARX is one of the most difficult and time-consuming problems due to the huge state space. We use a nested-based heuristic technique to find a differential path which is inspired by the nested Monte Carlo search (NMCS) algorithm. NMCS was successfully applied before for different games: Morpion Solitaire, SameGame, and 16 × 16 Sudoku, but the use of such heuristic techniques in cryptography is entirely new and time-saving.https://ieeexplore.ieee.org/document/8624250/Differential pathARX ciphersnested Monte-Carlo searchIoT ciphersdifferential cryptanalysisSPECK |
spellingShingle | Ashutosh Dhar Dwivedi Pawel Morawiecki Gautam Srivastava Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things Devices IEEE Access Differential path ARX ciphers nested Monte-Carlo search IoT ciphers differential cryptanalysis SPECK |
title | Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things Devices |
title_full | Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things Devices |
title_fullStr | Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things Devices |
title_full_unstemmed | Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things Devices |
title_short | Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things Devices |
title_sort | differential cryptanalysis of round reduced speck suitable for internet of things devices |
topic | Differential path ARX ciphers nested Monte-Carlo search IoT ciphers differential cryptanalysis SPECK |
url | https://ieeexplore.ieee.org/document/8624250/ |
work_keys_str_mv | AT ashutoshdhardwivedi differentialcryptanalysisofroundreducedspecksuitableforinternetofthingsdevices AT pawelmorawiecki differentialcryptanalysisofroundreducedspecksuitableforinternetofthingsdevices AT gautamsrivastava differentialcryptanalysisofroundreducedspecksuitableforinternetofthingsdevices |