{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T18:30:16Z","timestamp":1767983416775,"version":"3.49.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030105907","type":"print"},{"value":"9783030105914","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T00:00:00Z","timestamp":1610668800000},"content-version":"vor","delay-in-days":14,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Simon and Speck are two block cipher families published in 2013 by the US National Security Agency (NSA). These block ciphers, targeting lightweight applications, were suggested in 2015 to be included in <jats:italic>ISO\/IEC 29192-2 Information technology\u2014Security techniques\u2014Lightweight cryptography\u2014Part 2: Block ciphers<\/jats:italic>. Following 3.5 years of deliberations within ISO\/IEC JTC 1 they were rejected in April 2018. This chapter provides an account of the ISO\/IEC standardization process for Simon and Speck.<\/jats:p>","DOI":"10.1007\/978-3-030-10591-4_4","type":"book-chapter","created":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T14:06:41Z","timestamp":1610633201000},"page":"63-78","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["An Account of the ISO\/IEC Standardization of the Simon and Speck Block Cipher Families"],"prefix":"10.1007","author":[{"given":"Tomer","family":"Ashur","sequence":"first","affiliation":[]},{"given":"Atul","family":"Luykx","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,15]]},"reference":[{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, and Praveen Gauravaram. Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48. Cryptology ePrint Archive, Report 2015\/988, 2015. http:\/\/eprint.iacr.org\/2015\/988.","DOI":"10.1007\/978-3-319-26617-6_9"},{"key":"4_CR4","unstructured":"Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram, and Martin M. Lauridsen. Improved linear cryptanalysis of reduced-round SIMON. Cryptology ePrint Archive, Report 2014\/681, 2014. http:\/\/eprint.iacr.org\/2014\/681."},{"key":"4_CR5","unstructured":"Farzaneh Abed, Eik List, Stefan Lucks, and Jakob Wenzel. Cryptanalysis of the speck family of block ciphers. Cryptology ePrint Archive, Report 2013\/568, 2013. http:\/\/eprint.iacr.org\/2013\/568."},{"key":"4_CR6","unstructured":"Farzaneh Abed, Eik List, Stefan Lucks, and Jakob Wenzel. Differential and linear cryptanalysis of reduced-round simon. Cryptology ePrint Archive, Report 2013\/526, 2013. http:\/\/eprint.iacr.org\/2013\/526."},{"key":"4_CR18","unstructured":"Javad Alizadeh, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar, and Somitra Kumar Sanadhya. Linear cryptanalysis of round reduced SIMON. Cryptology ePrint Archive, Report 2013\/663, 2013. http:\/\/eprint.iacr.org\/2013\/663."},{"key":"4_CR19","unstructured":"Hoda A. Alkhzaimi and Martin M. Lauridsen. Cryptanalysis of the SIMON family of block ciphers. Cryptology ePrint Archive, Report 2013\/543, 2013. http:\/\/eprint.iacr.org\/2013\/543."},{"issue":"1","key":"4_CR28","doi-asserted-by":"publisher","first-page":"57","DOI":"10.46586\/tosc.v2016.i1.57-70","volume":"2016","author":"Tomer Ashur","year":"2016","unstructured":"Tomer Ashur and Yunwen Liu. Rotational cryptanalysis in the presence of constants. IACR Transactions on Symmetric Cryptology, 2016(1):57\u201370, 2016. http:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/535.","journal-title":"IACR Transactions on Symmetric Cryptology"},{"key":"4_CR64","unstructured":"Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, and Louis Wingers. The SIMON and SPECK families of lightweight block ciphers. Cryptology ePrint Archive, Report 2013\/404, 2013. http:\/\/eprint.iacr.org\/2013\/404."},{"key":"4_CR66","unstructured":"Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, and Louis Wingers. Notes on the design and analysis of SIMON and SPECK. Cryptology ePrint Archive, Report 2017\/560, 2017. http:\/\/eprint.iacr.org\/2017\/560."},{"key":"4_CR86","unstructured":"Karthikeyan Bhargavan and Ga\u00ebtan Leurent. On the practical (in-)security of 64-bit block ciphers: Collision attacks on HTTP over TLS and OpenVPN. In Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, and Shai Halevi, editors, ACM CCS 16: 23rd Conference on Computer and Communications Security, pages 456\u2013467, Vienna, Austria, October 24\u201328, 2016. ACM Press."},{"key":"4_CR138","unstructured":"Huaifeng Chen and Xiaoyun Wang. Improved linear hull attack on round-reduced Simon with dynamic key-guessing techniques. Cryptology ePrint Archive, Report 2015\/666, 2015. http:\/\/eprint.iacr.org\/2015\/666."},{"key":"4_CR183","doi-asserted-by":"crossref","unstructured":"Itai Dinur. Improved differential cryptanalysis of round-reduced Speck. Cryptology ePrint Archive, Report 2014\/320, 2014. http:\/\/eprint.iacr.org\/2014\/320.","DOI":"10.1007\/978-3-319-13051-4_9"},{"key":"4_CR214","unstructured":"Niels Ferguson, Stefan Lucks, Bruce Schneier, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas, and Jesse Walker. The skein hash function family (version 1.3). www.skein-hash.info\/sites\/default\/files\/skein1.3.pdf, 2010."},{"key":"4_CR217","unstructured":"International Organization for Standardization. Standardization and related activities \u2013 general vocabulary (iso\/iec guide no. 2), 2004."},{"key":"4_CR218","unstructured":"International Organization for Standardization. Information technology \u2013 security techniques \u2013 lightweight cryptography \u2013 part 2: Block ciphers (iso\/iec standard no. 29192\u20132), 2012."},{"key":"4_CR223","doi-asserted-by":"crossref","unstructured":"Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, and Lei Hu. MILP-based automatic search algorithms for differential and linear trails for speck. In Thomas Peyrin, editor, Fast Software Encryption \u2013 FSE 2016, volume 9783 of Lecture Notes in Computer Science, pages 268\u2013288, Bochum, Germany, March 20\u201323, 2016. Springer.","DOI":"10.1007\/978-3-662-52993-5_14"},{"key":"4_CR295","unstructured":"ISO. Iso\/iec directives, part 1 \u2013 consolidated jtc 1 supplement 2017 \u2013 procedures specific to jtc 1."},{"key":"4_CR296","unstructured":"ISO. Iso\/iec directives, part 2 \u2013 principles and rules for the structure and drafting of iso and iec documents (2018)."},{"issue":"3","key":"4_CR376","doi-asserted-by":"publisher","first-page":"24","DOI":"10.46586\/tosc.v2017.i3.24-36","volume":"2017","author":"Yunwen Liu","year":"2017","unstructured":"Yunwen Liu, Glenn De Witte, Adrin Ranea, and Tomer Ashur. Rotational-xor cryptanalysis of reduced-round speck. IACR Transactions on Symmetric Cryptology, 2017(3):24\u201336, Sep. 2017.","journal-title":"IACR Transactions on Symmetric Cryptology"},{"key":"4_CR377","doi-asserted-by":"crossref","unstructured":"Yunwen Liu, Qingju Wang, and Vincent Rijmen. Automatic search of linear trails in ARX with applications to SPECK and chaskey. In Mark Manulis, Ahmad-Reza Sadeghi, and Steve Schneider, editors, ACNS 16: 14th International Conference on Applied Cryptography and Network Security, volume 9696 of Lecture Notes in Computer Science, pages 485\u2013499, Guildford, UK, June 19\u201322, 2016. Springer.","DOI":"10.1007\/978-3-319-39555-5_26"},{"key":"4_CR444","unstructured":"NIST. Cryptographic standards and guidelines: Aes development. https:\/\/csrc.nist.gov\/Projects\/Cryptographic-Standards-and-Guidelines\/Archived-Crypto-Projects\/AES-Development."},{"key":"4_CR472","doi-asserted-by":"crossref","unstructured":"Christophe Petit and Jean-Jacques Quisquater. Cryptographic hash functions and expander graphs: The end of the story? In The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday, pages 304\u2013311, 2016.","DOI":"10.1007\/978-3-662-49301-4_19"},{"key":"4_CR490","unstructured":"Kexin Qiao, Lei Hu, and Siwei Sun. Differential security evaluation of simeck with dynamic key-guessing techniques. Cryptology ePrint Archive, Report 2015\/902, 2015. http:\/\/eprint.iacr.org\/2015\/902."},{"key":"4_CR523","unstructured":"Danping Shi, Lei Hu, Siwei Sun, Ling Song, Kexin Qiao, and Xiaoshuang Ma. Improved linear (hull) cryptanalysis of round-reduced versions of SIMON. Cryptology ePrint Archive, Report 2014\/973, 2014. http:\/\/eprint.iacr.org\/2014\/973."},{"key":"4_CR537","doi-asserted-by":"crossref","unstructured":"Ling Song, Zhangjie Huang, and Qianqian Yang. Automatic differential analysis of ARX block ciphers with application to SPECK and LEA. In Joseph K. Liu and Ron Steinfeld, editors, ACISP 16: 21st Australasian Conference on Information Security and Privacy, Part II, volume 9723 of Lecture Notes in Computer Science, pages 379\u2013394, Melbourne, VIC, Australia, July 4\u20136, 2016. Springer.","DOI":"10.1007\/978-3-319-40367-0_24"}],"container-title":["Security of Ubiquitous Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-10591-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T15:11:05Z","timestamp":1610637065000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-10591-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030105907","9783030105914"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-10591-4_4","relation":{},"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"15 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}