Bibliography

Below is a bibliography of papers addressing the cryptanalysis of Simon and Speck. The list is not comprehensive; we will add additional papers as we find them. Papers on non-cryptanalytic aspects of the algorithms are not included here. In particular, there are many papers on implementations, performance, and side-channel and fault analysis considerations that haven't been listed.

Improved linear cryptanalysis of reduced-round Simon

Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram, and Martin M. Lauridsen

ePrint

Cryptanalysis of the Speck Family of Block Ciphers

F. Abed, E. List, S. Lucks, J. Wenzel

ePrint

Differential Cryptanalysis of Round-Reduced Simon and Speck

F. Abed, E. List, S. Lucks, J. Wenzel

Paper

Differential and Linear Cryptanalysis of Reduced-round Simon

Farzaneh Abed, Eik List, Stefan Lucks, Jacob Wenzel

Paper

Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of Simon and KATAN

Z. Ahmadian, S. Rasoolzadeh, M. Salmasizadeh, M.R. Aref

Paper

Cryptanalysis of Simon variants with connections

J. Alizadeh, H.A. Alkhzaimi, M.R. Aref, N. Bagheri, P. Gauravaram, A. Kumar, M. Lauridsen, S.K. Sanadhya

Paper

Linear Cryptanalysis of Round Reduced Simon

J. Alizadeh, N. Bagheri, P. Gauravaram, A. Kumar, S.K. Sanadhya

Paper ePrint

Cryptanalysis of the Simon Family of Block Ciphers

H. AlKhzaimi, M.M. Lauridsen

Paper

Improved Linear Trails for the Block Cipher Simon

Tomer Ashur

Paper

Linear cryptanalysis of reduced-round Speck

T. Ashur, D. Bodden

Paper

Linear Cryptanalysis Using Low-bias Linear Approximations

Tomer Ashur, Daniel Bodden, Orr Dunkelman

Paper

On Linear Hulls and Trails in Simon

T Ashur, V Rijmen

Paper

A practical comparison between algebraic and statistical attacks on the lightweight cipher Simon

B. Astrid

Uppsala University Master's Thesis

Paper

A Salad of Block Ciphers

R. Avanzi

A monograph on the state of the art in block ciphers. Includes tables of best reduced-round attacks on Simon and Speck.

ePrint

Linear Cryptanalysis of Reduced-Round SIMECK Variants

Nasour Bagheri

Paper Paper mirror

Automatic search for the best trails in ARX: Application to block cipher Speck

Alex Biryukov, Vesselin Velichkov, and Yann LeCorre

Finds provably optimal difference paths for SPECK ciphers

Paper ePrint

Differential Analysis of Block Ciphers Simon and Speck

Alex Biryukov, Arnab Rob, and Vesselin Velichko

Differential paths and difference attacks on reduced-round versions of SIMON and SPECK

Paper ePrint

Pen and paper arguments for Simon and Simon-like designs

Christof Beierle

Describes how to obtain bounds on the weights of optimal differential paths using computationally simple techniques

Paper ePrint

Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon

C. Boura, M. Naya-Plasencia, V. Suder

Paper

Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques

Huaifeng Chen, Xiaoyun Wang

Provides the best reduced-round attacks on SIMON48, SIMON64, SIMON96, and SIMON128 in the standard security model

Paper ePrint

Differential-linear cryptanalysis of Simon32/64

Y. Chen, W. Zhang

Paper

Impossible differential cryptanalysis of reduced round Simon

Zhan Chen, Ning Wang, and Xiaoyun Wang

Describes reduced-round impossible differential attacks on SIMON32, SIMON48, and SIMON64

Paper ePrint

Improved Integral Attacks on Simon32 and Simon48 with Dynamic Key-Guessing Techniques

Z. Chu, H. Chen, X. Wang, X. Dong, and L. Li

Provides the best reduced-round attacks on SIMON32 and SIMON48 in the standard security model

Paper

Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon

N. Courtois, T. Mourouzis, G. Song

Paper

Predicting Outcomes of ElimLin Attack on Lightweight Block Cipher Simon

Nicolas T. Courtois, Pouyan Sepehrdad, Guangyan Song, Iason Papapanagiotakis-Bousy

Paper

Improved differential cryptanalysis of round-reduced Speck

Itai Dinur

Shows that if there is a usable differential through r rounds of a SPECK variant using an m-word key, then there is a key recovery attack on r+m rounds

Paper ePrint

Improved top-down techniques in differential cryptanalysis

I. Dinur, O. Dunkelman, M. Gutman, A. Shamir

Paper Paper mirror

Differential distribution properties of the Simon block cipher family

X. Dong, J. Guan

Paper

New integral attacks on Simon

K Fu, L Sun, M Wang

Paper

MILP-based automatic search algorithms for differential and linear trails for Speck

Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, and Lei Hu

Provides the best reduced-round attacks on SPECK64

Paper ePrint

Truncated Differential Based Known-Key Attacks on Round-Reduced Simon

Yonglin Hao, Willi Meier

Paper ePrint

Observations on the Simon block cipher family

Stefan Kolbl, Gregor Leander, and Tyge Tiessen

Develops techniques to find the differential probability and linear correlation corresponding to optimal difference and linear paths

Paper ePrint

A Brief Comparison of Simon and Simeck

S. Kolbl, A. Roy

Paper Slides

Analyzing key schedule of Simon: Iterative key differences and application to related-key impossible differentials

K. Kondo, Y. Sasaki, Y. Todo, T. Iwata

Paper

On the Design Rationale of Simon Block Cipher: Integral Attacks

K. Kondo, Y. Sasaki, Y. Todo, T. Iwata

Paper ePrint

Cryptanalysis of Simon et al.

E. Lambooij

Paper

Insights in the Simon Round Function

G. Leander, S. Kolbl, T. Tiessen

Slides

New impossible differential characteristic of Speck64 using MILP

HoChang Lee, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong

Exhibits 157 6-round impossible differential characteristics for SPECK64

ePrint

Detection of incompatible differential characteristics of ARX-based block cipher using MILP

HoChang Lee, HyungChul Kang, Bae Hong-Jin, Cheol Jae Seong, Hee Suk Hong

Finds 7-round impossible differentials for SPECK32, SPECK48, SPECK64, SPECK96 and an 8-round impossible differential for SPECK128

Paper

Calculating the Approximate Probability of Differentials for ARX-Based Cipher Using SAT Solver

H. Lee, H. Kang, D. Hong, J. Sung, and S. Hong

Provides the best reduced-round attacks on SPECK32 and SPECK48

Paper

Calculating the Approximate Probability of Differentials for ARX-Based Cipher Using SAT Solver

H.C. Lee, S. Kim, H.C. Kang, D. Hong

Paper

Related-Key Linear Cryptanalysis on Simon

Jung-Keun Lee, Bonwook Koo, Woo-Hwan Kim

Paper ePrint

Linear cryptanalysis of reduced-round Speck

Y. Liu, K. Fu, W. Wang, L. Sun, M. Wang

Paper

Rotational-XOR cryptanalysis of reduced-round Speck

Yunwen Liu, Glenn De Witte, Adrian Ranea, and Tomer Ashur

Exhibits reduced-round distinguishers for the SPECK ciphers in the related-key and open-key model.

Paper ePrint

Automatic search of linear trails in ARX with applications to Speck and CHASKEY

Yunwen Liu, Qingju Wang, and Vincent Rijmen

Provides the best provable bounds linear bounds through SPECK

Paper Paper mirror

The Security of Simon-like Ciphers Against Linear Cryptanalysis

Zhengbin Liu, Yongqiang

Paper ePrint

Optimal differential trails in Simon-like ciphers

Z. Liu, Y. Li, M. Wang

Paper

Cube Test and Analysis of Speck Block Cipher Algorithm

Wan Liuchan, Wei Yongzhuang

Paper

Considerations on Differential Cryptanalysis Attacks on Lightweightblock Ciphers

Florin Medeleanu, Marius Rogobete, Ciprian Racuciu

Paper

Advanced differential cryptanalysis of reduced-round Simon64/128 using large-round statistical distinguishers

T. Mourouzis, G. Song, N. Courtois, M. Christofii

Paper Paper mirror

Simon 32/64 and 64/128 block cipher: Study of cross correlation and linear span attack immunity

A.S. Omar, O. Basir

Paper

Differential Analysis on Simeck and Simon with Dynamic Key-guessing Techniques

Kexin Qiao, Lei Hu, Siwei Sun

Paper ePrint

Cube and dynamic cube attacks on Simon32/64

R. Rabbaninejad, Z. Ahmadian

Paper

Algebraic Analysis of the Simon Block Cipher Family

Havard Raddum

Paper Paper mirror

Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64

Raghvendra Rohit and Guang Gong

ePrint

Security Aspects of Symmetric-Key Primitives

Arnab Roy

University of Luxembourg doctoral dissertation

Paper

The distinguishing attack on Speck, Simon, Simeck, HIGHT, and LEA

Boris Ryabko and Aleksandr Soskov

Describes a statistical method to distinguish reduced-round variants (or full round in the case of Simeck)of various ciphers, including SIMON and SPECK, from a random permutation

Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of Simon-Like Ciphers

X. Shen, R. Li, B. Sun, L. Cheng, C. Li, M. Liao

Paper

Improved linear (hull) cryptanalysis of round-reduced versions of Simon

D. Shi, L. Hu, S. Sun, L. Song, K. Qiao, X. Ma

Paper

Match Box Meet-in-the-Middle Attacks on the Simon Family of Block Ciphers

Ling Song, Lei Hu, Bingke Ma, Danping Shi

Paper

Automatic differential analysis of ARX block ciphers with applications to Speck and LEA

Ling Song, Zhangjie Huang, and Qianqian Yang

this paper provides the best reduced-round attacks on SPECK64, SPECK96, and SPECK128

Paper ePrint

Improved Zero-Correlation Cryptanalysis on Simon

Ling Sun, Kai Fu, Meiqin Wang

Paper

MILP-Aided Bit-Based Division Property for ARX-Based Block Cipher

L Sun, W Wang, R Liu, M Wang

ePrint

Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to Simon, PRESENT, LBlock, DES(L) and Other Bit-oriented Block Ciphers

Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song

Paper ePrint

Towards Finding the Best Characteristics of Some Bit-oriented Block Ciphers and Automatic Enumeration of (Related-key) Differential and Linear Characteristcs with Predefined Properties

Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu

ePrint

Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of Simon

Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu

ePrint

Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis

S. Sun, L. Hu, M. Wang, Q. Yang, K. Qiao, X. Ma

Paper

Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications

S. Sun, L. Hu, M. Wang, P. Wang, K. Qiao, X. Ma

Paper

Algebraic Cryptanalysis of Deterministic Symmetric Encryption

Petr Susil

Paper

Bit-based division property and application to Simon family

Y. Todo, M. Morii

Paper Paper mirror ePrint

Improved differential attack on 30-round Simon64

G. Wang, N. Gan, Y. Li

Paper

Cryptanalysis of Reduced-round Simon32 and Simon48

Qingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, Yosuke Todo

Paper Paper mirror

Differential attacks on reduced Simon versions with dynamic key-guessing techniques

Ning Wang, Xiaoyun Wang, Keting Jia, and Jingyuan Zhao

this paper provides the best reduced-round attacks on SIMON96 and SIMON128 in the standard security model

Paper ePrint

Improved Differential Attacks on Reduced Simon Versions

Ning Wang, Xiaoyun Wang, Keting Jia, and Jingyuan Zhao

Paper

On the Division Property of Simon48 and Simon64

Zejun Xiang, Wentao Zhang, Dongdai Lin

Paper ePrint

Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers

Zejun Xiang, Wentao Zhang, Zhenzhen Bao, and Dongdai Lin

Paper ePrint

Zero-correlation linear cryptanalysis of reduced-round Simon

Wen-Ling Wu, Zhen-Qing Shi, Jian Zhang, Lei Zhang, Yan-Feng Wang

Paper

Automatic search for linear trails of the Speck family

Y. Yao, B. Zhang, W. Wu

Paper Slides

Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity

Pavol Zajac

Paper

Automatic Search of Impossible Differentials and Zero-Correlation Linear Hulls for ARX Ciphers

Kai Zhang, Jie Guan, Bin Hu

this paper finds thousands of 6 round impossible differentials and 44 6-round zero-correlation linear hulls for SPECK

Paper

Structural evaluation for Simon-like designs against integral attack

H Zhang, W Wu

Paper

Integral attack against bit-oriented block ciphers

H. Zhang, W. Wu, Y. Wang

Paper