(Quantum) Collision Attacks on Reduced Simpira v2
Simpira v2 is an AES-based permutation proposed by Gueron and Mouha at ASIACRYPT 2016. In this paper, we build an improved MILP model to count the differential and linear active Sboxes for Simpira v2, which achieves tighter bounds of the minimum number of active Sboxes for a few versions of Simpira...
Saved in:
Published in | IACR Transactions on Symmetric Cryptology Vol. 2021; no. 2; pp. 222 - 248 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Ruhr-Universität Bochum
01.01.2021
|
Subjects | |
Online Access | Get full text |
ISSN | 2519-173X 2519-173X |
DOI | 10.46586/tosc.v2021.i2.222-248 |
Cover
Summary: | Simpira v2 is an AES-based permutation proposed by Gueron and Mouha at ASIACRYPT 2016. In this paper, we build an improved MILP model to count the differential and linear active Sboxes for Simpira v2, which achieves tighter bounds of the minimum number of active Sboxes for a few versions of Simpira v2. Then, based on the new model, we find some new truncated differentials for Simpira v2 and give a series (quantum) collision attacks on two versions of reduced Simpira v2. |
---|---|
ISSN: | 2519-173X 2519-173X |
DOI: | 10.46586/tosc.v2021.i2.222-248 |