{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:44:05Z","timestamp":1740149045275,"version":"3.37.3"},"reference-count":21,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T00:00:00Z","timestamp":1595376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["2017-0-00267"],"award-info":[{"award-number":["2017-0-00267"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,7,22]]},"abstract":"<jats:p>Recently, Ashur and Liu introduced the <jats:italic>Rotational-XOR-difference<\/jats:italic> approach which is a modification of rotational cryptanalysis, for an ARX cipher Speck (Ashur and Liu, 2016). In this paper, we apply the Rotational-XOR-difference (RXD) approach to a non-ARX cipher Simon and evaluate its security. First, we studied how to calculate the probability of an RXD for bitwise AND operation that the round function of Simon is based on unlike Speck is on modular addition. Next, we prove that two RXD trails can be connected such that it becomes possible to construct a boomerang\/rectangle distinguisher similar to the case using differential characteristics. Finally, we construct related-key rectangle distinguishers for round-reduced versions of Simon with block lengths of 32, 48, and 64, and we suggest a five- or six-round key recovery attack. To our knowledge, it is the first attempt to apply the notion of rotational cryptanalysis for a non-ARX cipher. Although our attack does not show the best results for Simon thus far, the attempt here to define and apply a new cryptanalytic characteristic is meaningful, and we expect further improvements and applications to other ciphers to be made in subsequent studies.<\/jats:p>","DOI":"10.1155\/2020\/5968584","type":"journal-article","created":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T23:33:04Z","timestamp":1595460784000},"page":"1-12","source":"Crossref","is-referenced-by-count":4,"title":["Rotational-XOR Rectangle Cryptanalysis on Round-Reduced Simon"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5311-8115","authenticated-orcid":true,"given":"Bonwook","family":"Koo","sequence":"first","affiliation":[{"name":"The Affiliated Institute of ETRI, Daejeon, Republic of Korea"}]},{"given":"Younghoon","family":"Jung","sequence":"additional","affiliation":[{"name":"The Affiliated Institute of ETRI, Daejeon, Republic of Korea"}]},{"given":"Woo-Hwan","family":"Kim","sequence":"additional","affiliation":[{"name":"The Affiliated Institute of ETRI, Daejeon, Republic of Korea"}]}],"member":"311","reference":[{"year":"2010","key":"1"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1007\/978-3-319-13051-4_19"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1007\/11894063_4"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1007\/978-3-319-05149-9_1"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1007\/978-3-662-53887-6_18"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1007\/978-3-642-04138-9_20"},{"volume-title":"The simeck family of lightweight block ciphers","year":"2015","first-page":"307","key":"8"},{"key":"9","first-page":"333","volume-title":"Rotational cryptanalysis of ARX","volume":"6147","year":"2010"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1007\/978-3-642-13858-4_19"},{"issue":"1","key":"11","first-page":"57","volume":"2016","year":"2016","journal-title":"IACR Transactions on Symmetric Cryptology"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1007\/978-3-319-54433-5_5"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1007\/978-3-662-52993-5_22"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1007\/978-3-662-53008-5_6"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1007\/978-3-319-38898-4_8"},{"key":"16","first-page":"699","volume":"2018","year":"2018","journal-title":"IACR Cryptology ePrint Archive"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1007\/978-3-030-38471-5_9"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1007\/978-3-642-17373-8_1"},{"doi-asserted-by":"publisher","key":"19","DOI":"10.1007\/978-3-662-43933-3_13"},{"volume-title":"The boomerang attack","year":"1999","first-page":"156","key":"21"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1007\/3-540-44987-6_21"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1007\/s00145-007-9013-"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/5968584.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/5968584.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/5968584.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T23:33:07Z","timestamp":1595460787000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/5968584\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,22]]},"references-count":21,"alternative-id":["5968584","5968584"],"URL":"https:\/\/doi.org\/10.1155\/2020\/5968584","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2020,7,22]]}}}