Questions tagged [speck]

A family of lightweight symmetric block-ciphers designed for good performance in constrained software devices with block sizes ranging from 32 to 128 bits and key sizes ranging from 64 to 256 bits.

Speck is a family of symmetric block-cipher algorithms with block sizes ranging from 32 to 128 bits, and key sizes ranging from 64 bits up to 256 bits depending on the block size.

Speck is optimized for implementation in software on microcontrollers, while still providing good performance in hardware and other software implementations.

See the Wikipedia page for more information.

14 questions
9
votes
1 answer

What does NSA mean by 'Analyzable'?

Recently NSA published two new algorithms, Simon and Speck. In the abstract they say The aim of SIMON and SPECK is to fill the need for secure, flexible, and analyzable lightweight block ciphers. so as the question title says, what does…
rath
  • 2,598
  • 3
  • 27
  • 40
7
votes
1 answer

Security of a simple AEAD construction

Introduction I want securely communicate with a small 8-bit device which has a very limited program program memory (Arduino Uno - 32K). My goal is to minimize code size and RAM usage. There are multiple alternatives I could use, but I have reasons…
Roman
  • 73
  • 1
  • 6
5
votes
2 answers

How should we interpret the cryptanalysis results of SIMON and SPECK?

The NSA recently released SIMON and SPECK light weight block ciphers. Although initial spec release did not have much of cryptanalysis details, two works later appeared providing the cryptanalysis for the same SIMON and SPECK. But how should we…
sashank
  • 6,234
  • 4
  • 36
  • 68
4
votes
2 answers

Speck with signed math

I find myself implementing Speck in an industrial controller that only does signed math. What cryptographic ramifications would there be if the Speck algorithm was implemented using signed math?
TomTichy
  • 151
  • 1
  • 4
4
votes
1 answer

FHE Block ciphers' usage

There are currently FHE implementation for AES Simon Speck, and may be more. Except for speed testing, amortized or not, one meaningful usage is mitigating form side channel analysis. Intel, AMD, or ARM can implement this algorithms secured from…
kelalaka
  • 49,797
  • 12
  • 123
  • 211
4
votes
1 answer

Why do some ARX ciphers require many more rounds than others?

chacha20 has 20 rounds and even that is somewhat deceptive because the rounds alternate between columns and diagonals such that you need 2 rounds to involve the entire state. However if you compare it to some other ARX ciphers such as Threefish and…
Unlordship
  • 41
  • 2
4
votes
1 answer

Efficiently implementing Speck96

Are there any efficient implementations of Speck96? The problem is how to efficiently do 48-bit arithmetic on 64-bit words, the rotates in particular. I've been trying to implement it and have written the following in Rust: #[inline(always)] fn…
eof
  • 255
  • 1
  • 5
2
votes
1 answer

Is it secure to transmit a short plaintext with its MAC?

I have a short (32-bit) message that needs to be authenticated. Due to the constraints of my platform, I would like to use Speck32/64 (32-bit block, 64-bit key) with a Matyas-Meyer-Oseas one-way compression function (due to its ease of…
2
votes
1 answer

Where can I find a clear diagram of the SPECK algorithm?

Where can I find a clear algorithm diagram of SPECK algorithm? I want to follow steps to write ARM assembly code.
A A
  • 21
  • 1
1
vote
1 answer

differential diffusion property of addition in SPECK cipher

I'm studying Impossible Differential Cryptanalysis of SPECK paper and I'm having trouble understanding the differential diffusion property of addition in page 19 which is as follows: can someone explain what that property means or what symbol…
siba36
  • 301
  • 1
  • 12
1
vote
1 answer

Speck32 with low-entropy messages

I'm using Speck 32 to encode a very low-entroy set of bits (so that the messages stay very short) It encodes two numbers: w: 16 bits: but in most circumstances the message is one of only 10-100 possibilities (~3-7 bits) v: 8 bits, but in most…
Schuyler
  • 43
  • 1
  • 3
1
vote
1 answer

Speck vs Threefish's Mix

When comparing Speck to Threefish's Mix: The difference is that Threefish uses multiple rotation constants and only a single word is rotated in contrast to Speck which uses the same rotations every round and rotates both words in different…
SusieL
  • 11
  • 2
0
votes
1 answer

What happens at this part in the key schedule of a Speck...?

I am trying to figure out the process behind the Speck block cipher. I understand how XOR works (Exclusive-or) when you take 2 strings of bits and you want to XOR them together. However, in the key schedule of the cipher, there is a point where…
0
votes
0 answers

How to securely modify the NIST SPECK block cipher into a tweak block cipher without using tweak block modes?

I have a functioning implementation of the NIST SPECK block cipher that I wish to modify to support a tweak. While I am aware that there are a number of papers proposing secure methods of turning a block cipher into a tweakable one, all the ones I…
cookiecipher
  • 359
  • 1
  • 8