Simon is a family of lightweight block ciphers publicly released by the National Security Agency (NSA) in June 2013. Simon has been optimized for performance in hardware implementations, while its sister algorithm, Speck , has been optimized for software implementations.
23-487: (Redirected from Simón ) [REDACTED] Look up simon or Simon in Wiktionary, the free dictionary. Simon may refer to: People [ edit ] Simon (given name) , including a list of people and fictional characters with the given name Simon Simon (surname) , including a list of people with the surname Simon Eugène Simon , French naturalist and
46-463: A full list of techniques used is not given. Simon's designers have been criticized for not providing more details on NSA cryptanalysis of the ciphers. The NSA has approved Simon128/256 and Speck128/256 for use in U.S. National Security Systems, though AES-256 is still recommended for non-constrained applications. Initial attempts to standardise Simon and Speck failed to meet International Organization for Standardization super-majority required by
69-443: A popular computer game Simon Says , children's game Literature [ edit ] Simon (Sutcliff novel) , a children's historical novel written by Rosemary Sutcliff Simon (Sand novel) , an 1835 novel by George Sand Simon Necronomicon (1977), a purported grimoire written by an unknown author, with an introduction by a man identified only as "Simon" Music [ edit ] Simon (album) , an album by
92-487: A radio station in Greensboro, North Carolina Brands and enterprises [ edit ] La Maison Simons , a Quebec department store Simon Property Group Electronics and technology [ edit ] Simon (cipher) Simon (computer) , a 1950s personal computer IBM Simon the first smartphone SIMON breach grenade , a door breaching rifle grenade Other uses [ edit ] Simon (cat) ,
115-473: A ship's cat who was awarded the Dickin Medal See also [ edit ] All pages with titles containing Simon All pages with titles beginning with Simon Justice Simon (disambiguation) Saint-Simon (disambiguation) Shimon (disambiguation) Shimun (disambiguation) Simao (disambiguation) Simeon (disambiguation) Simone (disambiguation) Topics referred to by
138-541: Is a real-world cost to unnecessarily large security margins, especially on lightweight devices, that cryptanalysis during the design phase allowed the number of rounds to be set appropriately, and that they targeted AES's security margin. Simon includes a round counter in the key schedule . The designers state this was included to block slide and rotational cryptanalysis attacks. Still, rotational-XOR cryptanalysis has been used to find distinguishers against reduced-round versions of related ciphers like Speck. Though
161-528: Is different from Wikidata All article disambiguation pages All disambiguation pages simon Too Many Requests If you report this error to the Wikimedia System Administrators, please include the details below. Request from 172.68.168.133 via cp1102 cp1102, Varnish XID 117281729 Upstream caches: cp1102 int Error: 429, Too Many Requests at Fri, 29 Nov 2024 08:45:27 GMT Simon (cipher) The NSA began working on
184-454: Is the value m . Therefore, a Simon cipher implementation is denoted as Simon2 n / nm . For example, Simon64/128 refers to the cipher operating on a 64-bit plaintext block ( n = 32) that uses a 128-bit key. The block component of the cipher is uniform between the Simon implementations; however, the key generation logic is dependent on the implementation of 2, 3 or 4 keys. Simon supports
207-456: Is typical for iterated ciphers , reduced-round variants have been successfully attacked. The best published attacks on Simon in the standard attack model (CPA/CCA with unknown key) are differential cryptanalysis attacks; these make it through about 70–75% of the rounds of most variants, though these best attacks are only marginally faster than brute-force . The design team states that while designing Simon, they found differential attacks to be
230-404: Is used to determine the structure of the key expansion, resulting in a total bit width of m ∗ n {\displaystyle m*n} . The key word expansion consists of a right shift, XOR and a constant sequence, z x {\displaystyle z_{x}} . The z x {\displaystyle z_{x}} bit operates on the lowest bit of
253-475: The Simon and Speck ciphers in 2011. The agency anticipated some agencies in the US federal government would need a cipher that would operate well on a diverse collection of Internet of Things devices while maintaining an acceptable level of security. The Simon block cipher is a balanced Feistel cipher with an n -bit word, and therefore the block length is 2 n . The key length is a multiple of n by 2, 3, or 4, which
SECTION 10
#1732869927022276-477: The authors don't describe standard key-recovery attacks based on their distinguishers, their best distinguishers on Simon32 and Simon48 in the known-key distinguishing attack model for certain weak key classes make it through slightly more rounds than the best differential distinguishers. One of the authors has said that his research was resource-constrained and that rotational-XOR distinguishers on more rounds are probably possible. The designers also state that Simon
299-560: The band Gruvis Malt Simon (EP) , an EP by Dirty Little Rabbits Television [ edit ] Simon (French TV series) , a 2016 French animated children's television series Simon (American TV series) , a 1995 American sitcom Simon & Simon , 1980s television series with brother detectives Simon (The Walking Dead) , a fictional character from the television series The Walking Dead Other arts, entertainment, and media [ edit ] Simon's Cat , an animated cartoon and book series WSMW , aka Simon FM,
322-1789: The following combinations of block sizes, key sizes and number of rounds: Let S j {\displaystyle S^{j}} notate a left circular shift by j {\displaystyle j} bits. The key schedule is mathematically described as k i + m = { c ⊕ ( z j ) i ⊕ k i ⊕ ( I ⊕ S − 1 ) ( S − 3 k i + 1 ) , m = 2 c ⊕ ( z j ) i ⊕ k i ⊕ ( I ⊕ S − 1 ) ( S − 3 k i + 2 ) , m = 3 c ⊕ ( z j ) i ⊕ k i ⊕ ( I ⊕ S − 1 ) ( S − 3 k i + 3 ⊕ k i + 1 ) , m = 4 {\displaystyle k_{i+m}=\left\{{\begin{array}{ll}c\oplus \left(z_{j}\right)_{i}\oplus k_{i}\oplus \left(I\oplus S^{-1}\right)\left(S^{-3}k_{i+1}\right),&m=2\\c\oplus \left(z_{j}\right)_{i}\oplus k_{i}\oplus \left(I\oplus S^{-1}\right)\left(S^{-3}k_{i+2}\right),&m=3\\c\oplus \left(z_{j}\right)_{i}\oplus k_{i}\oplus \left(I\oplus S^{-1}\right)\left(S^{-3}k_{i+3}\oplus k_{i+1}\right),&m=4\\\end{array}}\right.} The key schedule structure may or may not be balanced. The key word count of m {\displaystyle m}
345-809: The genus authority Simon Tribe of Simeon , one of the twelve tribes of Israel Places [ edit ] Şimon (Hungarian: Simon ), a village in Bran Commune, Braşov County, Romania Șimon , a right tributary of the river Turcu in Romania Arts, entertainment, and media [ edit ] Films [ edit ] Simon (1980 film) , starring Alan Arkin Simon (2004 film) , Dutch drama directed by Eddy Terstall Simón (2018 film) , Venezuelan short film directed by Diego Vicentini Simón (2023 film) , Venezuelan feature film directed by Diego Vicentini Games [ edit ] Simon (game) ,
368-569: The key schedule. The LFSR has different logic for each z x {\displaystyle z_{x}} sequence; however, the initial condition is the same for encryption. The initial condition of the LFSR for decryption varies on the round. The designers claim that Simon, though a "lightweight" cipher, is designed to have the full security possible for each block and key size, against standard chosen-plaintext (CPA) and chosen-ciphertext (CCA) attacks. Resistance against related-key attacks
391-423: The key word once per round. The constant sequence, z x {\displaystyle z_{x}} , is created by a Linear Feedback Shift Register ( LFSR ). The logical sequence of bit constants is set by the value of the key and block sizes. The LFSR is created by a 5-bit field. The constant bit operates on a key block once per round on the lowest bit in order to add non-key-dependent entropy to
414-536: The limiting attacks, i.e. the type of attack that makes it through the most rounds; they then set the number of rounds to leave a security margin similar to AES-128 's at approximately 30%. Simon has been criticized for having too small a security margin, i.e. too few rounds between the best attacks and the full cipher, in comparison to more conservative ciphers such as ChaCha20 . Ciphers with small security margins are more likely to be broken by future advances in cryptanalysis . Simon's design team counters that there
437-550: The new ciphers, and the NSA's previous involvement in the creation and promotion of the backdoored Dual_EC_DRBG cryptographic algorithm. In response to concerns, the NSA stated that more than 70 security analysis papers from some of the world's leading cryptographers support NSA's conclusion that the algorithms are secure and NSA affirmed that it is not aware of any cryptanalytic techniques that would allow them or anyone else to exploit Simon or Speck. After initial attempts to standardise
460-495: The process and the ciphers were not adopted. Expert delegates to the ISO from several countries including Germany, Japan and Israel opposed the efforts by the NSA to standardise the Simon and Speck ciphers, citing concerns that the NSA is pushing for their standardisation with knowledge of exploitable weaknesses in the ciphers. The position was based on partial evidence of weaknesses in the ciphers, lack of clear need for standardisation of
483-456: The same term [REDACTED] This disambiguation page lists articles associated with the title Simon . If an internal link led you here, you may wish to change the link to point directly to the intended article. Retrieved from " https://en.wikipedia.org/w/index.php?title=Simon&oldid=1254960362 " Category : Disambiguation pages Hidden categories: Articles containing Hungarian-language text Short description
SECTION 20
#1732869927022506-455: Was also stated as a goal, though a less crucial one as attacks in that model are not relevant for typical use cases. No effort was made to resist attacks in the known-key distinguishing attack model, nor did the designers evaluate Simon for use as a hash function . As of 2018, no successful attack on full-round Simon of any variant is known. Due to interest in Simon and Speck, about 70 cryptanalysis papers have been published on them. As
529-444: Was not designed to resist known-key distinguishing attacks (which do not directly compromise the confidentiality of ciphers). The designers state that NSA cryptanalysis found the algorithms to have no weaknesses, and security commensurate with their key lengths. The design team says that their cryptanalysis included linear and differential cryptanalysis using standard techniques such as Matsui's algorithm and SAT/SMT solvers, though
#21978