Simon and Speck: Block Ciphers for Internet of Things
Simon and Speck: Block Ciphers for the Internet of Things∗ Ray Beaulieu Douglas Shors Jason Smith Stefan Treatman-Clark Bryan Weeks Louis Wingers National Security Agency 9800 Savage Road, Fort Meade, MD, 20755, USA rayb@ccrwest.org, {djshors, jksmit3, sgtreat, beweeks, lrwinge}@tycho.ncsc.mil 9 July 2015 Abstract application (e.g., with hard-wired key or for IC print ing), or designing specifically for low-latency appli The U.S. National Security Agency (NSA) developed the Simon and Speck families of cations, and so on. lightweight block ciphers as an aid for securing We would argue that what’s needed in the Internet applications in very constrained environments of Things (IoT) era is not more Kirtland’s warblers where AES may not be suitable. This paper sum and koalas, as wonderful as such animals may be, marizes the algorithms, their design rationale, but crows and coyotes. An animal that eats only eu along with current cryptanalysis and implemen calyptus leaves, even if it outcompetes the koala, will tation results. never become widely distributed. Similarly, a block cipher highly optimized for performance on a partic 1 Introduction ular microcontroller will likely be outcompeted on other platforms, and could be of very limited utility Biologists make a distinction between specialist in 15 years when its target platform is obsolete. species, which occupy narrow ecological niches, and generalists, which can survive in a broader variety of Of course it’s hard to get a handle on block cipher environmental conditions. Specialists include Kirt performance on devices that don’t yet exist. But what land’s warbler, a bird that only nests in 5–20 year-old we can do is strive for simplicity, by designing algo jack pine forests, and the koala, which feeds (almost) rithms around very basic operations that are certain exclusively on eucalyptus leaves.
[Show full text]