JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2023, Vol. 58 ›› Issue (9): 51-58.doi: 10.6040/j.issn.1671-9352.0.2022.162

Previous Articles     Next Articles

Research on cryptographic properties of generalized SIMON-like round functions

Jianwei LU1(),Jizhou REN2,Jie GUAN1   

  1. 1. Cryptographic Engineering Academy, Strategic Support Forces Information Engineering University, Zhengzhou 450001, Henan, China
    2. College of Engineering Computing & Cybernetics, Australian National University, Canberra 2600, Australia
  • Received:2022-03-16 Online:2023-09-20 Published:2023-09-08

Abstract:

Based on the SIMON-like nonlinear function, a generalized nonlinear function Fabcdn(X) is obtained, and the structure is as follows: (x<<<a)&(x<<<b)⊕(x<<<c)&(x<<<d). The cryptographic properties of Fabcdn(X) such as difference and linearity are given. The corresponding relationship between the rank of the difference matrix, output difference and difference probability is given; the value of the difference probability is 0 or 1/2r, where r ∈ [0, n-1]; the difference probability is non-zero when β=0; under the selection of special shift parameters, the corresponding difference structure and counting formula are given when the difference probability is 1/2. By using the disjoint algorithm, the problem of the correlated advantage value can be transformed into calculating the number of quadratic terms in the disjoint quadratic form, and the value range of the correlated advantage is given. These conclusions provide a new method for the construction of lightweight nonlinear functions.

Key words: SIMON algorithm, nonlinear function, cyclic shift, differential property, linear property

CLC Number: 

  • TN918.1

Table 1

Counting table with 1/2 correlation advantage points"

n F051n F0512n F182n F1827n
9 72 0 72 0
10 640 0 80 0
11 88 0 88 0
12 96 0 96 0
1 BEAULIEU R, SHORS D, SMITH J, et al. The SIMON and SPECK lightweight block ciphers[C]//Proceedings of the 52nd Annual Design Automation Conference, San Francisco: IEEE, 2015: 1-6.
2 BOGDANOV A, KNUDSEN L R, LEANDER G, et al. PRESENT: an ultra-lightweight block cipher[C]//International Workshop on Cryptographic Hardware and Embedded Systems, Vienna: Springer, 2007: 450-466.
3 HELL M , JOHANSSON T , MEIER W . Grain: a stream cipher for constrained environments[J]. International Journal of Wireless Mobile Computing, 2007, 2 (1): 86- 93.
doi: 10.1504/IJWMC.2007.013798
4 DE CANNIERE C. Trivium: a stream cipher construction inspired by block cipher design principles[C]//International Conference on Information Security, Berlin: Springer, 2006: 171-186.
5 BABBAGE S, DODD M. The stream cipher MICKEY 2.0[EB/OL]. (2006-06-30)[2022-03-26]. https://www.ecrypt.eu.org/stream/p2ciphers/mickey128/old/mickey128_p2_old_20060630.pdf.2006.
6 GUO J, PEYRIN T, POSCHMANN A. The PHOTON family of lightweight hash functions[C]//Annual Cryptology Conference, Berlin: Springer, 2011: 222-239.
7 AUMASSON J-P, HENZEN L, MEIER W, et al. Quark: a lightweight hash[C]//International Workshop on Cryptographic Hardware and Embedded Systems, Santa Barbara: Springer, 2010: 1-15.
8 HIROSE S, IDEGUCHI K, KUWAKADO H, et al. A lightweight 256-bit hash function for hardware and low-end devices: Lesamnta-LW[C]//International Conference on Information Security and Cryptology, Berlin: Springer, 2010: 151-168.
9 MOUHA N, MENNINK B, VAN HERREWEGE A, et al. Chaskey: an efficient MAC algorithm for 32-bit microcontrollers[C]//International Conference on Selected Areas in Cryptography, Quebec: Springer, 2014: 306-323.
10 GONG Z , HARTEL P , NIKOVA S , et al. TuLP: a family of lightweight message authentication codes for body sensor networks[J]. Journal of Computer Science Technology, 2014, 29 (1): 53- 68.
doi: 10.1007/s11390-013-1411-8
11 LUYKX A, PRENEEL B, TISCHHAUSER E, et al. A MAC mode for lightweight block ciphers[C]//International Conference on Fast Software Encryption, Bochum: Springer, 2016: 43-59.
12 YANG G, ZHU B, SUDER V, et al. The simeck family of lightweight block ciphers[C]//International Workshop on Cryptographic Hardware and Embedded Systems, Saint-Malo: Springer, 2015: 307-329.
13 董向忠, 关杰. SIMON类算法轮函数的差分性质分析[J]. 密码学报, 2015, 2 (3): 207- 216.
DONG Xiangzhong , GUAN Jie . Analysis on differential properties of the round function of SIMON family of block ciphers[J]. Journal of Cryptologic Research, 2015, 2 (3): 207- 216.
14 SHI D P, SUN S W, SASAKI Y, et al. Correlation of quadratic Boolean functions: cryptanalysis of all versions of full MORUS[C]// Annual International Cryptology Conference, Santa Barbara: Springer, 2019: 180-209.
15 关杰, 卢健伟, 刘帅. 一类新的基于元胞自动机的S盒的线性性质研究[J]. 密码学报, 2021, 8 (4): 650- 659.
GUAN Jie , LU Jianwei , LIU Shuai . Research on linear properties of a new S-box based on cellular automata[J]. Journal of Cryptologic Research, 2021, 8 (4): 650- 659.
16 关杰, 黄俊君. Keccak类S盒的线性性质研究[J]. 电子与信息学报, 2020, 42 (7): 1790- 1795.
GUAN Jie , HUANG Junjun . Research on linear properties of Keccak-like S-box[J]. Journal of Electronics & Information Technology, 2020, 42 (7): 1790- 1795.
17 鞠桂枝, 赵亚群. 多输出部分Bent函数若干性质的研究[J]. 工程数学学报, 2005, 22 (6): 1129- 1132.
JU Guizhi , ZHAO Yaqun . Study on properties of multi-output partially Bent functions[J]. Chinese Journal of Engineering Mathematics, 2005, 22 (6): 1129- 1132.
[1] MA Wei-feng, CHEN Peng-yu. Solution manifold and its C1-smoothness for differential equations with state-dependent delay [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2021, 56(2): 92-96.
[2] GUO Fei-wang, ZHANG Xi-yong, HAN Wen-bao. A construction of perfect nonlinear functions [J]. J4, 2011, 46(3): 26-30.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] TANG Feng-qin1, BAI Jian-ming2. The precise large deviations for a risk model with extended negatively upper orthant dependent claim  sizes[J]. J4, 2013, 48(1): 100 -106 .
[2] CHENG Zhi1,2, SUN Cui-fang2, WANG Ning1, DU Xian-neng1. On the fibre product of Zn and its property[J]. J4, 2013, 48(2): 15 -19 .
[3] TANG Xiao-hong1, HU Wen-xiao2*, WEI Yan-feng2, JIANG Xi-long2, ZHANG Jing-ying2, SHAO Xue-dong3. Screening and biological characteristics studies of wide wine-making yeasts[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(03): 12 -17 .
[4] Ming-Chit Liu. THE TWO GOLDBACH CONJECTURES[J]. J4, 2013, 48(2): 1 -14 .
[5] ZHAO Tong-xin1, LIU Lin-de1*, ZHANG Li1, PAN Cheng-chen2, JIA Xing-jun1. Pollinators and pollen polymorphism of  Wisteria sinensis (Sims) Sweet[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(03): 1 -5 .
[6] WANG Kai-rong, GAO Pei-ting. Two mixed conjugate gradient methods based on DY[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(6): 16 -23 .
[7] HE Hai-lun, CHEN Xiu-lan* . Circular dichroism detection of the effects of denaturants and buffers on the conformation of cold-adapted protease MCP-01 and  mesophilic protease BP01[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2013, 48(1): 23 -29 .
[8] SUN Xiao-ting1, JIN Lan2*. Application of DOSY in oligosaccharide mixture analysis[J]. J4, 2013, 48(1): 43 -45 .
[9] YANG Ying, JIANG Long*, SUO Xin-li. Choquet integral representation of premium functional and related properties on capacity space[J]. J4, 2013, 48(1): 78 -82 .
[10] YANG Jun. Characterization and structural control of metalbased nanomaterials[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2013, 48(1): 1 -22 .