(Quantum) Collision Attacks on Reduced Simpira v2

Authors

  • Boyu Ni School of Cyber Science and Technology, Shandong University, Qingdao, China
  • Xiaoyang Dong Institute for Advanced Study, BNRist, Tsinghua University, Beijing, China
  • Keting Jia Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University, Beijing, China
  • Qidi You Department of Computer Science and Technology, Tsinghua University, Beijing, China

DOI:

https://doi.org/10.46586/tosc.v2021.i2.222-248

Keywords:

Collision, Rebound Attack, Simpira v2, Quantum Attack, MILP

Abstract

Simpira v2 is an AES-based permutation proposed by Gueron and Mouha at ASIACRYPT 2016. In this paper, we build an improved MILP model to count the differential and linear active Sboxes for Simpira v2, which achieves tighter bounds of the minimum number of active Sboxes for a few versions of Simpira v2. Then, based on the new model, we find some new truncated differentials for Simpira v2 and give a series (quantum) collision attacks on two versions of reduced Simpira v2.

Downloads

Published

2021-06-11

How to Cite

Ni, B., Dong, X., Jia, K., & You, Q. (2021). (Quantum) Collision Attacks on Reduced Simpira v2. IACR Transactions on Symmetric Cryptology, 2021(2), 222–248. https://doi.org/10.46586/tosc.v2021.i2.222-248

Issue

Section

Articles