(Quantum) Collision Attacks on Reduced Simpira v2
DOI:
https://doi.org/10.46586/tosc.v2021.i2.222-248Keywords:
Collision, Rebound Attack, Simpira v2, Quantum Attack, MILPAbstract
Simpira v2 is an AES-based permutation proposed by Gueron and Mouha at ASIACRYPT 2016. In this paper, we build an improved MILP model to count the differential and linear active Sboxes for Simpira v2, which achieves tighter bounds of the minimum number of active Sboxes for a few versions of Simpira v2. Then, based on the new model, we find some new truncated differentials for Simpira v2 and give a series (quantum) collision attacks on two versions of reduced Simpira v2.
Published
2021-06-11
Issue
Section
Articles
License
Copyright (c) 2021 Boyu Ni, Xiaoyang Dong, Keting Jia, Qidi You
This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
(Quantum) Collision Attacks on Reduced Simpira v2. (2021). IACR Transactions on Symmetric Cryptology, 2021(2), 222-248. https://doi.org/10.46586/tosc.v2021.i2.222-248