The SIMON and SPECK Families of Lightweight Block Ciphers.
Citations
1,523 citations
504 citations
Cites background or methods from "The SIMON and SPECK Families of Lig..."
...Simon and Speck were proposed publicly in June 2013 [10] by a group of researchers in the US National Security Agency’s Research Directorate....
[...]
...We briefly describe the Simon and Speck algorithms here, but refer the reader to [10] for complete details....
[...]
...A full description can be found in [10]....
[...]
...The Simon key schedules employ round constants to eliminate slide properties; we omit discussion of the constants here (see [10] for details)....
[...]
278 citations
Cites methods from "The SIMON and SPECK Families of Lig..."
...Firstly, this methodology is only suitable to evaluate the security of constructions with S-boxes, XOR operations and bit permutations, and can not be applied to block cipher like SPECK [5], which involve modulo addition and no S-boxes at all....
[...]
262 citations
Additional excerpts
..., PRESENT [150], KTAN/KTANTAN [151], SIMON/SPECK [152], etc....
[...]
...In secret-key cryptography, this includes introduction of several lightweight stream ciphers (e.g., Trivium [148], Grain [149], etc.) and block ciphers (e.g., PRESENT [150], KTAN/KTANTAN [151], SIMON/SPECK [152], etc.) together with lightweight implementations of various secretkey primitives (e.g., [153]–[156])....
[...]
259 citations
Cites background or methods from "The SIMON and SPECK Families of Lig..."
...However, we would argue that the way to design e cient cryptography, particularly cryptography for constrained platforms, is to forgo them in favor of very simple components, iterating an appropriate number of times to obtain a secure algorithm....
[...]
...Table 7 shows a sample of higher-throughput implementations on the same 130 nmASIC process used to generate the Simon and Speck data in Table 3....
[...]
...To facilitate these sorts of interactions, and in particular to support e cient communication with large numbers of constrained devices, lightweight algorithms will need to perform well on both lightweight and “heavyweight” platforms....
[...]
...Both algorithms employ 8-bit rotations, and the other rotations used are as close to multiples of 8 as we could make them, without sacri cing security....
[...]