(Quantum) Collision Attacks on Reduced Simpira v2

  • Boyu Ni School of Cyber Science and Technology, Shandong University, Qingdao, China
  • Xiaoyang Dong Institute for Advanced Study, BNRist, Tsinghua University, Beijing, China
  • Keting Jia Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University, Beijing, China
  • Qidi You Department of Computer Science and Technology, Tsinghua University, Beijing, China
Keywords: Collision, Rebound Attack, Simpira v2, Quantum Attack, MILP

Abstract

Simpira v2 is an AES-based permutation proposed by Gueron and Mouha at ASIACRYPT 2016. In this paper, we build an improved MILP model to count the differential and linear active Sboxes for Simpira v2, which achieves tighter bounds of the minimum number of active Sboxes for a few versions of Simpira v2. Then, based on the new model, we find some new truncated differentials for Simpira v2 and give a series (quantum) collision attacks on two versions of reduced Simpira v2.

Published
2021-06-11
How to Cite
Ni, B., Dong, X., Jia, K., & You, Q. (2021). (Quantum) Collision Attacks on Reduced Simpira v2. IACR Transactions on Symmetric Cryptology, 2021(2), 222-248. https://doi.org/10.46586/tosc.v2021.i2.222-248
Section
Articles