Cryptanalysis of the SIMON Cypher Using Neo4j (2405.04735v2)
Abstract: The exponential growth in the number of Internet of Things (IoT) devices has seen the introduction of several Lightweight Encryption Algorithms (LEA). While LEAs are designed to enhance the integrity, privacy and security of data collected and transmitted by IoT devices, it is hazardous to assume that all LEAs are secure and exhibit similar levels of protection. To improve encryption strength, cryptanalysts and algorithm designers routinely probe LEAs using various cryptanalysis techniques to identify vulnerabilities and limitations of LEAs. Despite recent improvements in the efficiency of cryptanalysis utilising heuristic methods and a Partial Difference Distribution Table (PDDT), the process remains inefficient, with the random nature of the heuristic inhibiting reproducible results. However, the use of a PDDT presents opportunities to identify relationships between differentials utilising knowledge graphs, leading to the identification of efficient paths throughout the PDDT. This paper introduces the novel use of knowledge graphs to identify intricate relationships between differentials in the SIMON LEA, allowing for the identification of optimal paths throughout the differentials, and increasing the effectiveness of the differential security analyses of SIMON.
- IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet of Things Journal, 6(5):8182–8201, 2019.
- Cyber and physical security vulnerability assessment for IoT-based smart homes. sensors, 18(3):817, 2018.
- Security and Privacy for Low Power IoT Devices on 5G and Beyond Networks: Challenges and Future Directions. IEEE Access, 2023.
- The SIMON and SPECK families of lightweight block ciphers. cryptology eprint archive, 2013.
- An account of the ISO/IEC standardization of the Simon and Speck block cipher families. Security of Ubiquitous Computing Systems: Selected Topics, pages 63–78, 2021.
- An introduction to block cipher cryptanalysis. Proceedings of the IEEE, 94(2):346–356, 2006.
- Christopher Swenson. Modern cryptanalysis: techniques for advanced code breaking. John Wiley & Sons, 2008.
- Cryptanalysis. Modern Cryptography: Applied Mathematics for Encryption and Information Security, pages 357–372, 2021.
- Differential cryptanalysis of round-reduced speck suitable for internet of things devices. IEEE Access, 7:16476–16486, 2019.
- Security analysis of lightweight IoT encryption algorithms: SIMON and SIMECK. Internet of Things, page 100677, 2023.
- Heuristic random optimization. Computers & chemical engineering, 22(3):427–444, 1998.
- Effectiveness of antithetic sampling and stratified sampling in Monte Carlo chronological production cost modeling (power systems). IEEE Transactions on Power Systems, 6(2):669–675, 1991.
- Heuristic decision making. Annual review of psychology, 62:451–482, 2011.
- Automatic search for differential trails in ARX ciphers. In Topics in Cryptology–CT-RSA 2014: The Cryptographer’s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings, pages 227–250. Springer, 2014.
- Introduction: what is a knowledge graph? Knowledge graphs: Methodology, tools and selected use cases, pages 1–10, 2020.
- Towards a definition of knowledge graphs. SEMANTiCS (Posters, Demos, SuCCESS), 48(1-4):2, 2016.
- Knowledge graphs: Opportunities and challenges. Artificial Intelligence Review, pages 1–32, 2023.
- Explainable reasoning over knowledge graphs for recommendation. In Proceedings of the AAAI conference on artificial intelligence, volume 33, pages 5329–5336, 2019.
- Lightweight Cryptanalysis of IoT Encryption Algorithms: Is Quota Sampling the Answer? arXiv preprint arXiv:2404.08165, 2024.
- The SIMON and SPECK lightweight block ciphers. In Proceedings of the 52nd annual design automation conference, pages 1–6, 2015.
- Visual studio c/c++ ide and compiler for windows. https://visualstudio.microsoft.com/vs/features/cplusplus/. (Accessed on 02/02/2024).
- Neo4j Graph Database & Analytics | Graph Database Management System. https://neo4j.com/.
- What is a Graph Database? - Developer Guides. https://neo4j.com/developer/graph-database/, 2021.
- Exploring network structure, dynamics, and function using NetworkX. Technical report, Los Alamos National Lab.(LANL), Los Alamos, NM (United States), 2008.
- Revisiting heuristic evaluation methods to improve the reliability of findings. In e-Health–For Continuity of Care, pages 930–934. IOS Press, 2014.
- Horst Feistel. Cryptography and computer privacy. Scientific american, 228(5):15–23, 1973.
- Cryptographic strength evaluation of key schedule algorithms. Security and Communication Networks, 2020:1–9, 2020.
- Rémi Coulom. Computing “elo ratings” of move patterns in the game of go. ICGA journal, 30(4):198–208, 2007.
- Mohammed Eid Khamees Al-Shammary and Sufyan Salim Mahmood Al-Dabbagh. Differential Distribution Table implementation DDT survey. Technium: Romanian Journal of Applied Sciences and Technology, 4, 2022.
- Differential cryptanalysis of the full 16-round DES. In Advances in Cryptology—CRYPTO’92: 12th Annual International Cryptology Conference Santa Barbara, California, USA August 16–20, 1992 Proceedings 12, pages 487–496. Springer, 1993.
- Philip Hawkes. Differential-linear weak key classes of IDEA. In Advances in Cryptology—EUROCRYPT’98: International Conference on the Theory and Application of Cryptographic Techniques Espoo, Finland, May 31–June 4, 1998 Proceedings 17, pages 112–126. Springer, 1998.
- Truncated differentials and Skipjack. In Annual International Cryptology Conference, pages 165–180. Springer, 1999.
- Mark Lutz. Programming python. " O’Reilly Media, Inc.", 2001.
- KR Srinath. Python–the fastest growing programming language. International Research Journal of Engineering and Technology, 4(12):354–357, 2017.