{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,3]],"date-time":"2026-05-03T11:02:04Z","timestamp":1777806124569,"version":"3.51.4"},"reference-count":46,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Security"],"published-print":{"date-parts":[[2020,11,27]]},"abstract":"<jats:p>SPECK is a family of lightweight block ciphers developed by Beaulieu et al. of the US National Security Agency (NSA) for the Internet of Things (IoT). It is an ARX-based design with a Feistel-like structure which supports keys of size ranging from 64 bits to 256 bits. SPECK has been standardised by ISO\/IEC for radio frequency identification (RFID) devices. It has drawn the attention of many cryptanalysts and several cryptanalysis results have been published. In this paper, carry flag attacks on the full SPECK ciphers are presented. Depending on the key size and block size, the complexities of our attacks, to nearly ensure success, vary from [Formula: see text] time and [Formula: see text] data to [Formula: see text] time and [Formula: see text] data.<\/jats:p>","DOI":"10.3233\/jcs-200021","type":"journal-article","created":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T10:58:49Z","timestamp":1603191529000},"page":"655-676","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":3,"title":["Side channel analysis of SPECK"],"prefix":"10.1177","volume":"28","author":[{"given":"Mabin","family":"Joseph","sequence":"first","affiliation":[{"name":"Indira Gandhi Centre for Atomic Research, Kalpakkam, Tamil Nadu, India. E-mail:\u00a0"},{"name":"Homi Bhabha National Institute, Training School Complex, Anushakti Nagar, Mumbai, India"}]},{"given":"Gautham","family":"Sekar","sequence":"additional","affiliation":[{"name":"Madras Fintech Services Pvt. Ltd, Chennai, India. E-mail:\u00a0"},{"name":"Birla Institute of Technology & Science, Pilani, India"}]},{"given":"R.","family":"Balasubramanian","sequence":"additional","affiliation":[{"name":"Homi Bhabha National Institute, Training School Complex, Anushakti Nagar, Mumbai, India"},{"name":"The Institute of Mathematical Sciences, Taramani, Chennai, India. E-mail:\u00a0"}]}],"member":"179","published-online":{"date-parts":[[2020,10,20]]},"reference":[{"key":"ref001","doi-asserted-by":"crossref","unstructured":"F.\u00a0Abed, E.\u00a0List, S.\u00a0Lucks and J.\u00a0Wenzel, Differential Cryptanalysis of Round-Reduced SIMON and SPECK, in: International Workshop on Fast Software Encryption, Proceedings of FSE 2014, LNCS, Vol.\u00a08540, 2015, pp.\u00a0525\u2013545.","DOI":"10.1007\/978-3-662-46706-0_27"},{"key":"ref002","doi-asserted-by":"crossref","unstructured":"Atmel: Atmel AVR 32 Architecture Document, 2011, available at: http:\/\/ww1.microchip.com\/downloads\/en\/DeviceDoc\/doc32000.pdf.","DOI":"10.1007\/978-3-031-79849-8_1"},{"key":"ref003","unstructured":"Atmel: Atmel AVR Instruction Set Manual [OTHER], 2016, available at: http:\/\/ww1.microchip.com\/downloads\/en\/DeviceDoc\/Atmel-0856-AVR-Instruction-Set-Manual.pdf."},{"key":"ref004","doi-asserted-by":"crossref","unstructured":"R.\u00a0Beaulieu, D.\u00a0Shors, J.\u00a0Smith, S.\u00a0Treatman-Clark, B.\u00a0Weeks and L.\u00a0Wingers, Implementation and Performance of the SIMON and SPECK Lightweight Block Ciphers on ASICs, 2016, available at: https:\/\/nsacyber.github.io\/simon-speck\/papers\/simon-speck-asic-2014.pdf.","DOI":"10.1145\/2744769.2747946"},{"key":"ref005","unstructured":"R.\u00a0Beaulieu, D.\u00a0Shors, J.\u00a0Smith, S.\u00a0Treatman-Clark, B.\u00a0Weeks and L.\u00a0Wingers, Notes on the design and analysis of SIMON and SPECK, in: Cryptology ePrint Archive, Report 2017\/560, 2017, available at: http:\/\/eprint.iacr.org\/2017\/560."},{"key":"ref006","unstructured":"R.\u00a0Beaulieu, D.\u00a0Shors, J.\u00a0Smith, S.\u00a0Treatman-Clark, B.\u00a0Weeks and L.\u00a0Wingers, SIMON and SPECK: Block Ciphers for the Internet of Things, in: NIST Lightweight Cryptography Workshop, 2015, available at: https:\/\/csrc.nist.gov\/csrc\/media\/events\/lightweight-cryptography-workshop-2015\/documents\/papers\/session1-shors-paper.pdf."},{"key":"ref007","doi-asserted-by":"crossref","unstructured":"R.\u00a0Beaulieu, D.\u00a0Shors, J.\u00a0Smith, S.\u00a0Treatman-Clark, B.\u00a0Weeks and L.\u00a0Wingers, The SIMON and SPECK Block Ciphers on AVR 8-Bit Microcontrollers, in: International Workshop on Lightweight Cryptography for Security and Privacy, Proceedings of LightSec 2014, LNCS, Vol.\u00a08898, 2015, pp.\u00a03\u201320.","DOI":"10.1007\/978-3-319-16363-5_1"},{"key":"ref008","unstructured":"R.\u00a0Beaulieu, D.\u00a0Shors, J.\u00a0Smith, S.\u00a0Treatman-Clark, B.\u00a0Weeks and L.\u00a0Wingers, The SIMON and SPECK Families of Lightweight Block Ciphers, in: Cryptology ePrint Archive, Report 2013\/404, 2013, available at: http:\/\/eprint.iacr.org\/2013\/404."},{"key":"ref009","doi-asserted-by":"crossref","unstructured":"K.\u00a0Bhargavan and G.\u00a0Leurent, On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN, in: ACM SIGSAC Conference on Computer and Communications Security, Proceedings of CCS, Vol.\u00a02016, 2016, pp.\u00a0456\u2013467.","DOI":"10.1145\/2976749.2978423"},{"key":"ref010","doi-asserted-by":"crossref","unstructured":"A.\u00a0Biryukov, A.\u00a0Roy and V.\u00a0Velichkov, Differential Analysis of Block Ciphers SIMON and SPECK, in: International Workshop on Fast Software Encryption, Proceedings of FSE 2014, LNCS, Vol.\u00a08540, 2015, pp.\u00a0546\u2013570.","DOI":"10.1007\/978-3-662-46706-0_28"},{"key":"ref011","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3005504"},{"key":"ref012","unstructured":"Crypto API Dev: Crypto: Speck \u2013 remove Speck, 2018, available at: https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/herbert\/cryptodev-2.6.git\/commit\/?anzwix=1&id=578bdaabd015b9b164842c3e8ace9802f38e7ecc."},{"key":"ref013","unstructured":"D.\u00a0Dinu, A.\u00a0Biryukov, J.\u00a0Gro\u00dfsch\u00e4dl, D.\u00a0Khovratovich, Y.L.\u00a0Corre and L.\u00a0Perrin, FELICS \u2013 Fair Evaluation of Lightweight Cryptographic Systems, in: NIST Lightweight Cryptography Workshop, 2015, available at: https:\/\/www.cryptolux.org\/images\/8\/80\/Session7-dinu-paper.pdf."},{"key":"ref014","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13051-4_9"},{"key":"ref015","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894337"},{"key":"ref016","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-53177-9_17"},{"key":"ref017","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_6"},{"key":"ref018","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2009.36"},{"key":"ref019","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_13"},{"key":"ref020","doi-asserted-by":"crossref","unstructured":"K.\u00a0Fu, M.\u00a0Wang, Y.\u00a0Guo, S.\u00a0Sun and L.\u00a0Hu, MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck, in: International Workshop on Fast Software Encryption, Proceedings of FSE 2016, LNCS, Vol.\u00a09783, 2016, pp.\u00a0268\u2013288.","DOI":"10.1007\/978-3-662-52993-5_14"},{"key":"ref021","doi-asserted-by":"crossref","unstructured":"J.\u00a0Ge, A.\u00a0Wang, L.\u00a0Zhu, X.\u00a0Liu, N.\u00a0Shang and G.\u00a0Zhang, Power Analysis and Protection on SPECK and Its Application in IoT, in: International Conference on Security and Privacy in Communication Networks, Proceedings of SecureComm 2019, LNICST, Vol.\u00a0305, 2019, pp.\u00a0350\u2013362.","DOI":"10.1007\/978-3-030-37231-6_20"},{"key":"ref022","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45853-0_6"},{"key":"ref023","doi-asserted-by":"crossref","unstructured":"J.\u00a0Heyszl, S.\u00a0Mangard, B.\u00a0Heinz, F.\u00a0Stumpf and G.\u00a0Sigl, Localized Electromagnetic Analysis of Cryptographic Implementations, in: Cryptographers\u2019 Track at the RSA Conference, Proceedings of CT-RSA 2012, LNCS, Vol.\u00a07178, 2012, pp.\u00a0231\u2013244.","DOI":"10.1007\/978-3-642-27954-6_15"},{"key":"ref024","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i3.1-29"},{"key":"ref025","doi-asserted-by":"crossref","unstructured":"M.\u00a0Huang and L.\u00a0Wang, Automatic Search for the Linear (Hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey, and CHAM-64, in: Security and Communication Networks 2020, 2020, available at: https:\/\/www.hindawi.com\/journals\/scn\/2020\/4898612\/.","DOI":"10.1155\/2020\/4898612"},{"key":"ref026","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Huo, F.\u00a0Zhang, X.\u00a0Feng and L.\u00a0Wang, Improved Differential Fault Attack on the Block Cipher SPECK, in: IEEE Workshop on Fault Diagnosis and Tolerance in Cryptography, Proceedings of FDTC 2015, 2015, pp.\u00a028\u201334.","DOI":"10.1109\/FDTC.2015.15"},{"key":"ref027","unstructured":"International Organization for Standardization: ISO\/IEC 29167-22:2018, 2018, available at: https:\/\/www.iso.org\/standard\/70389.html."},{"key":"ref028","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2000-82-304"},{"key":"ref029","doi-asserted-by":"crossref","unstructured":"U.M.\u00a0Khokhar, Deep Learning-Based Cryptanalysis of Lightweight Block Ciphers, in: Security and Communication Networks 2020, 2020, available at: https:\/\/www.hindawi.com\/journals\/scn\/2020\/3701067\/.","DOI":"10.1155\/2020\/3701067"},{"key":"ref030","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.2019EAP1083"},{"key":"ref031","doi-asserted-by":"crossref","unstructured":"M.\u00a0Li, J.\u00a0Guo, J.\u00a0Cui and L.\u00a0Xu, Impossible Differential Cryptanalysis of SPECK, in: Chinese Conference on Trusted Computing and Information Security, Proceedings of CTCIS 2018, CCIS, Vol.\u00a0960, 2019, pp.\u00a016\u201331.","DOI":"10.1007\/978-981-13-5913-2_2"},{"key":"ref032","unstructured":"Linux kernel source tree: Crypto: Speck \u2013 add support for the Speck block cipher, 2018, available at: https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?id=da7a0ab5b4babbe5d7a46f852582be06a00a28f0."},{"key":"ref033","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2017.i3.24-36"},{"key":"ref034","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0136-3"},{"key":"ref035","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2005.12.013"},{"key":"ref036","unstructured":"Phoronix: Google Decides Not To Use Speck For Disk Encryption, Instead Developing HPolyC, 2018, available at: https:\/\/www.phoronix.com\/scan.php?page=news_item&px=No-Speck-Yes-HPolyC-Encryption."},{"key":"ref037","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.152"},{"key":"ref038","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2917015"},{"key":"ref039","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.03.002"},{"key":"ref040","doi-asserted-by":"crossref","unstructured":"G.\u00a0Sekar, Side Channel Cryptanalysis of Streebog, in: International Conference on Research in Security Standardisation, Proceedings of SSR 2015, LNCS, Vol.\u00a09497, 2015, pp.\u00a0154\u2013162.","DOI":"10.1007\/978-3-319-27152-1_8"},{"key":"ref041","doi-asserted-by":"crossref","unstructured":"L.\u00a0Song, Z.\u00a0Huang and Q.\u00a0Yang, Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA, in: Australasian Conference on Information Security and Privacy, Proceedings of ACISP 2016, LNCS, Vol.\u00a09723, 2016, pp.\u00a0379\u2013394.","DOI":"10.1007\/978-3-319-40367-0_24"},{"key":"ref042","doi-asserted-by":"crossref","unstructured":"H.\u00a0Tupsamudre, S.\u00a0Bisht and D.\u00a0Mukhopadhyay, Differential Fault Analysis on the Families of SIMON and SPECK Ciphers, in: IEEE Workshop on Fault Diagnosis and Tolerance in Cryptography, Proceedings of FDTC 2014, 2014, pp.\u00a040\u201348.","DOI":"10.1109\/FDTC.2014.14"},{"key":"ref043","doi-asserted-by":"crossref","unstructured":"N.R.\u00a0Weidler, D.\u00a0Brown, S.A.\u00a0Mitchel, J.\u00a0Anderson, J.R.\u00a0Williams, A.\u00a0Costley, C.\u00a0Kunz, C.\u00a0Wilkinson, R.\u00a0Wehbe and R.\u00a0Gerdes, Return-Oriented Programming on a Cortex-M Processor, in: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Processings of IEEE Trustcom 2017, 2017, pp.\u00a0823\u2013832.","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.318"},{"key":"ref044","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2018.10.002"},{"key":"ref045","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Yuan, B.\u00a0Zhang and W.\u00a0Wu, Automatic Search for Linear Trails of the SPECK Family, in: Information Security Conference, Proceedings of ISC 2015, LNCS, Vol.\u00a09290, 2015, pp.\u00a0158\u2013176.","DOI":"10.1007\/978-3-319-23318-5_9"},{"key":"ref046","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-018-0038-1"}],"container-title":["Journal of Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-200021","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JCS-200021","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-200021","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T20:45:25Z","timestamp":1777495525000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JCS-200021"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,20]]},"references-count":46,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,11,27]]}},"alternative-id":["10.3233\/JCS-200021"],"URL":"https:\/\/doi.org\/10.3233\/jcs-200021","relation":{},"ISSN":["0926-227X","1875-8924"],"issn-type":[{"value":"0926-227X","type":"print"},{"value":"1875-8924","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,20]]}}}