1. Introduction
Lightweight cryptography is a rapidly growing area of research, emerging to fill the need for securing highly-constrained devices such as RFID tags and sensor networks. The limited hardware and software resources require that the cryptographic primitives be highly efficient. In 2013, the U.S. National Security Agency introduced two families of lightweight block ciphers for this effort:
Simon and
Speck that have a simple design and perform well on constrained software environments [
1]. Since then, both block ciphers have attracted the attention of researchers and have been the subject of many security investigations.
In this paper, we propose an extension of the classical linear cryptanalytic approach which uses multiple linear approximations and Matsui’s second algorithm. The standard approach, of extending the linear approximation by a single round of decryption (encryption), comes at the cost of guessing the last round (first round) key: for an n-bit round key for Simon block size . We propose extending the linear approximation by a super-round—which, in the case of Simon, is four rounds with a total cost , for , depending on the Simon variant, leading to the determination of four round keys, instead of the single round key obtained through the traditional approach. Directly applying Matsui’s approach by appending four rounds would require a cost of ); but this is not necessary because of the weakness in Simon, which we express as a super round. Thus we demonstrate a simple, efficient extension of the key recovery attack using Matsui’s second algorithm, and recover multiple round keys, including the entire master key in some cases. For this reason, we compare our results with other results in the literature that were obtained using the classical simple Matsui’s second algorithm without recourse to linear hull approaches.
1.1. Our Contributions
In this paper we present an attack on reduced-round Simon, illustrating it in detail for Simon 32/64, and providing a sketch of it for other variants. Our attack is based on the observation that, after four rounds of encryption, one bit of the left half of the state of Simon 32/64 depends on only 17 key bits, and linear cryptanalysis requires the guessing of only 16 bits, the size of a single round key. A single bit of right half state similarly depends on 8 key bits (seven need to be guessed for linear cryptanalysis). By focusing on a single bit of the state at a time, we are able to partition the key into smaller strings, enabling us to more efficiently apply exhaustive search to perform linear cryptanalysis, doing it 16 (or 7) bits at a time. We are able to determine multiple round keys, which corresponds to a large fraction of the independent master key bits. This approach extends to other variants of Simon as well. We summarize the approach below for Simon 32/64.
We define the super round—four rounds of encryption with output limited to a single bit—and the corresponding super key limited to the relevant 16 (or 7) bits. For each bit of state, we extend the super round with an appropriate linear approximation with one active input bit. We carry out Matsui’s second cryptanalysis using the super round instead of a single round and obtain the corresponding super key by performing an exhaustive search over 16 (or 7) bits. We do this for all 32 bits of the state. Thus, the use of the super round significantly improves the overall time complexity of linear cryptanalysis of Simon.
We thus obtain 16 super keys of size 16 each (left half) and 16 super keys of size 7 each (right half), with considerable overlap among the key bits, as there are only 48 independent master key bits in the four-round cipher extended by the linear approximation. Consequently, we obtain 368 related key bits representing 48 independent key bits, which allows for error correction. We can further extend the super round and the linear approximation with an additional two rounds at the end, to obtain 60 independent key bits, which can be used to obtain up to 60 master key bits.
We extend the above attack to other variants of
Simon. We also perform an experimental verification of our attack on 8, 10 and 12-round
Simon 32/64. Using the capacity-based projections of the relationship of bias to the number of P/C pairs [
2], we predict the determination of the entire master key of 20-round
Simon 32/64, with
P/C pairs and time complexity
. We are also able to determine all 64 master key bits of 8-round
Simon using a meet-in-the-middle attack with one super round of encryption and one super round of decryption, with data complexity
and time complexity
.
We need to point out that [
3] has an observation similar to ours: that a single bit after four rounds of encryption is affected only by 18 bits, and they use it to define a related-key attack. We had derived this result independently.
1.2. Comparison with Other Work
We now compare our results with those of Alizadeh et al. [
4], which are improvements on their peer-reviewed work in [
5] and are currently the best peer-reviewed attacks on
Simon that use the classical Matsui’s second algorithm and multiple approximations. As we mentioned earlier, linear hull attacks are able to go deeper; here, we focus on our improvement on the classical approach without recourse to linear hulls. ([
6] claims better work than [
4], but is not peer-reviewed and has been criticized in the literature so we are not sure if the results hold; see
Section 3.) Alizadeh et al. present two types of linear cryptanalysis: one using Matsui’s second algorithm and the other using multiple linear cryptanalysis. They do not use both attacks simultaneously as we do in this paper. For a fair comparison with our work, we had to make changes to how the data complexity was computed in their work. As we are using multiple linear approximations, we used the capacity model [
2] for both our work and theirs. This generally helped improve their numbers. We computed the cost of using
n approximations, each corresponding to a shift of one bit, which enabled the computation of all the key bits we were able to compute. Additionally, they present the average case complexity of their attacks: each guessed key bit involved in an XOR is counted as half a bit. In the literature, it is standard to count each key bit guessed as a single bit, whether it is included only in an ANDed expression or not. We hence present two sets of comparisons.
- 1.
Table 1 shows the comparisons using average case complexity in counting guessed key bits, as used in their work. Key bits in a bitwise AND operation are counted as half a bit each, whereas all other key bits are counted as a single bit each. Their argument is that when we have an expression such as
, if we guess
as a zero there is no need to continue guessing the second bit because the ANDed value will be zero independent of the value of
. Using this computation of the time complexity, we are able to go deeper than [
4] for all
Simon versions.
- 2.
Table 2 shows a comparison of worst-case time complexity, which is the standard in the literature. Each key bit guessed is counted as a single key bit, and we recomputed their numbers in order to accurately reflect this in both our work and theirs. We are able to go deeper for
Simon 32/64,
Simon 64/128 and
Simon 128/256, and in the other versions, even though we cryptanalyze the same number of rounds, the time complexity of their attacks is worse than brute force attacks.
Note that, in our proposed model, we only use independent linear approximations; as a result, we avoid the issue described in [
7], about using dependent approximations in another work on
Simon.
It might be worth investigating how to combine our model with more general multidimensional cryptanalysis, where approximation independency is not assumed [
8].
2. Simon
Simon is a family of lightweight block ciphers designed by U.S. National Security Agency (NSA) in 2013 [
9], which aims to provide lightweight resource-constrained devices with needed security. It supports a variety of block and key sizes which is denoted by
Simon, where
n is the word size,
m is the number of key words and
is the block size. The following
Table 3 lists other variants:
It is designed based on a Feistel structure with the key-dependent round function, (see
Figure 1):
The specification of each block cipher is determined by the two main functions, the round function, and the key schedule. Thus, the round function
F consists of three operations: bitwise XOR ⊕, bitwise AND &, and left circular shift by
j bits
. It can be expressed as:
The key schedule takes the master key
K as an input and generates
r subkeys
. The first
w subkeys are initialized with the master key words,
. Depending on the number of key words
w, a different procedure is applied as the following:
As it is shown above, the generated subkey is XOR-ed with a constant
c which is equal to
and the
ith bit of
, where the choice of
depends on
Simon versions. Thus, these constants are added to prevent slide attacks and eliminate circular shift symmetries. There are five constant sequences
,
,
,
, and
, which take the following values:
3. Related Work
We focus in this paper on linear cryptanalysis. The best linear results on Simon are obtained using linear hulls.
First introduced by [
10], the linear hull is a set of linear approximations with the same input and output masks. Abdelraheem et al. [
4] generalized the method of converting any differential characteristic to a linear characteristic for
Simon, and investigated the security of
Simon against different variants of linear cryptanalysis, classical, multiple and linear hull. Using linear hull, they present attacks on the reduced-round of 21, 21, 29, 36, and 50 rounds of
Simon 32/64,
Simon 48/96,
Simon 64/128,
Simon 96/144, and
Simon 128/256.
Shi et al. [
11] by using the method of automatic enumeration of differential and linear approximations Mixed-integer Linear Programming presented in [
12], they present linear hull crytpanalysis on the reduced-round 21, 21, 29 rounds for
Simon 32/64,
Simon 48/96,
Simon 64/128 respectively.
Then, Abdelraheem et al. [
13] proposed a time-memory trade-off method to search for highly biased linear trails. Hence, they found 14-round and 17-round linear approximations for
Simon 32 and
Simon 48 respectively. As a result, they present 24, 23 and 24 rounds of
Simon 32/64,
Simon 48/72 and
Simon 48/96. Additionally, Sun et al. [
12] present a 16-round linear hull for
Simon 48/96, which used to break up 23 rounds.
The best linear hull attacks presented in [
7] by using a dynamic key-guessing technique which first proposed to improve the differential cryptanalysis in [
14]. They apply the dynamic- key-guessing method to reduce the number of key bits required guessing, and they present linear hull attacks on the reduced-round 23, 25, 31, 38 and 53 for
Simon 32,
Simon 48,
Simon 64,
Simon 96 and
Simon 128 respectively. An interesting future work direction would be to examine the combination of linear hulls and super rounds.
Table 4 summarizes the linear hull attack results on
Simon.
Moreover, there are other results using different attack methods such as Zero-correlation linear cryptanalysis. Bogdanov et al. [
15] propose an extension of linear cryptanalysis based on linear approximations with correlation Zero, called Zero-correlation linear cryptanalysis. [
16] present Zero-correlation linear cryptanalysis on all versions of
Simon. Hence, they successfully present attacks on 19, 20, 22, 23, 25, 28, 33, and 34 rounds for
Simon 32/64,
Simon 48/72,
Simon 48/96,
Simon 64/96,
Simon 64/128,
Simon 96/144,
Simon 128/192 and
Simon 128/256 respectively.
Wang et al. [
17] also present improved results using zero-correlation with the help of divide-and-conquer technique on 20, 21 and 21 rounds of
Simon 32/64,
Simon 48/72,
Simon 48/96. Then, Sun et al. [
18] improved Zero-correlation linear cryptanalysis presented in [
17] on
Simon 32/64,
Simon 48/72,
Simon 48/96 and the first to apply it on the larger variants of
Simon. Hence, they attack 21, 21, 22, 23, 24, 28, 32 and 34 rounds of
Simon 32/64,
Simon 48/72,
Simon 48/96,
Simon 64/96,
Simon 64/128,
Simon 96/144,
Simon 128/192 and
Simon 128/256 respectively.
There are works that focused on the classical linear cryptanalysis. The first work to look at is [
19] by Abed et al., where they analyze the linear properties of
Simon round function. Hence, they linearize the only non-linear part which is the bitwise AND operation, and present this linear approximation:
, which holds with probability 3/4, and bias
.
Moreover, following this approach they generate linear trails to a larger number of rounds and to all Simon versions. Hence, they successfully present linear cryptanalysis of length 11, 14, 16, 20 and 23 on Simon 32, Simon 48, Simon 64, Simon 96 and Simon 128 respectively. Since their attack is considered Matsui’s first algorithm, the required number of plaintext and ciphertext pairs is what determines the complexity of the attack. Accordingly, the required data complexity were , , , and for Simon 32, Simon 48, Simon 64, Simon 96 and Simon 128 respectively.
Improved results in terms of covering more rounds have been presented by Alizadeh et al. in [
20], where they exploit a direct connection between linear characteristics and differential characteristics. So given an r-round differential characteristic, an equivalent r-round linear characteristic can be constructed. Given this observation, they derived improved linear trails and then mounted linear cryptanalysis using Matsui’s first algorithm with a reported success probability of 0.997 for 12, 15, 19, 28 and 35 rounds for
Simon 32,
Simon 48,
Simon 64,
Simon 96, and
Simon 128 respectively.
Because in these two works [
19,
20], they apply Matsui’s first algorithm, they were only able to determine
a parity bits of the subkeys, where
a represents the number of approximations that have been used, which is equal to the block size 32, 48, 64, 96 and 128.
In [
4], they consider the classical linear cryptanalysis and multiple linear cryptanalysis. So, they extend the previous results to cover more rounds and launch key recovery attacks using Matsui’s second algorithm, and recover 27.5 key bits of
Simon 32, and the average of 32.5, 41.5, 42.5, and 78 key bits for
Simon 48,
Simon 64,
Simon 96 and
Simon 128. Thus, they have successfully introduced attacks on 17, 20, 23, 34 and 42 rounds for all versions of
Simon 32,
Simon 48,
Simon 64,
Simon 96 and
Simon 128 respectively. Moreover, they apply multiple linear cryptanalysis and present attacks on 18, 20, 22, 33 and 39 rounds of respective block sizes of 32, 48, 64, 96, and 128 bits respectively, and they can determine
n parity bits of the subkeys.
The most recent results were presented in [
6] by Ashur. They describe a new method to compute the bias of linear trails, which was then used to obtain longer linear approximations than what previous works have obtained. The literature calls into question the correctness of the results presented in this work. In particular, from [
7], “it uses the correlation when all the subkeys are zero as the expected correlation under random key situations, which is not exact. Moreover, if the potential of each linear hull of the cipher is smaller than that of random permutations, then the combination of these linear hulls can not distinguish between the cipher and a random permutation.”
4. The Cryptanalytic Model
In this section we describe the idea of a super round and its super key, and the use of this idea in linear cryptanalysis as well as for a brute force attack on eight rounds on Simon 32/64.
We first establish some notation. Superscripts denote round number beginning with 0, and subscripts denote bit number from left to right, also beginning with 0. We denote by and the left and right half inputs respectively to the j-th cipher round (and hence the outputs of the -th round), and by the i-th bit of the j-th round key. Left and right plaintext and ciphertext halves are denoted , , and respectively.
4.1. Central Observation
We observe that, after four rounds of Simon 32/64 encryption, one bit of the left half of the state depends on only 16 key bits—the size of one round key. One bit of the right half depends on only 7 key bits. On the other hand, the 32-bit state after four rounds of encryption depends on all 64 master key bits. Thus, by focusing on a single bit of the state, we are able to partition the key into smaller pieces. This enables us to more efficiently apply exhaustive search, doing it 16 (or 7) bits at a time.
In Matsui’s second linear cryptanalysis, the first (or final) round key is determined by encryption (or decryption) with all possibilities (exhaustive search), choosing the most likely one. One would like to be able to use the same approach to determine all possible master key bits, instead of only those in the final round key. Performing an exhaustive search by encrypting multiple rounds is, however, prohibitively expensive. Using our observation, it is possible to efficiently encrypt the four first rounds (not only the first round), by focusing on a single bit of state at a time, and performing an exhaustive search over smaller pieces of the key. To extend Matsui’s second linear cryptanalysis to four rounds in this manner, we would need linear cryptanalytic expressions with only a single bit of input state. The expressions and the encryption are symmetric with respect to the single bit of super round output, and we are hence able to perform this type of cryptanalysis on every bit of super round output.
An outline of the attack is as follows:
- 1.
For every bit of super round output, we guess all possible combinations of the corresponding 16 key bits for the left half, or 7 for the right half, to obtain the most likely one. We do this for all 32 bits of the block.
- 2.
This gives us 16 keys of size 16 each (left half) and 16 keys of size 7 each (right half), with considerable overlap among the key bits, as there are only 48 independent master key bits.
- 3.
We obtain 368 related key bits representing 48 independent key bits, which allows for correcting errors.
The complexity of this attack is where N is the number of plaintext-ciphertext (P/C) pairs used.
4.2. The Super Round
We use the term super round to represent a generalization of the four-round encryption we described above.
Definition 1 (Super Rounds and Super Keys).A super round for a block cipher is a function representing s-rounds of encryption of the cipher, for some . It takes as input a full block of plaintext and the required key bits, and outputs t bits of ciphertext, where t is considerably smaller than the block size. The required key bits for a super round are referred to as a super key.
Examples: For Simon 32/64:
A super round of the first four rounds requires a super key for the left half of length 16 and has as output a single bit of left-half ciphertext.
A super-round of the first four rounds requires a super key for the right half of length 7 key bits and has as output a single bit of right-half ciphertext.
Figure 2 depicts these examples, where
represents the super round.
4.3. Linear Cryptanalysis with Super Rounds
In this section we describe the general linear cryptanalytic attack of Matsui’s second algorithm with super rounds. The linear approximations we will derive in
Section 5 are chosen so as to have a single bit of input—
or
—which is approximately related to multiple bits of the ciphertext
C (see
Figure 3). The super round itself relates this bit, exactly, (modulo a key bit absorbed into the linear approximation) to the plaintext
P and the
ith super key. Thus we obtain an approximate relationship between
P,
C and the super key bits. By performing an exhaustive search over the super key space, we obtain the super key bits. We repeat this process for all bits of the super round output.
For each of the two super rounds (for left and right hand output halves), for each value of
i, there are corresponding 16-bit and 7-bit super keys.
Table 5 lists the components of the super keys.
We see that each super key for the left half contains nine bits from , in the form for . Thus a particular bit of , say , appears in the super key of left half bits , for . That is, if we determine the super key for each value of i in the left half of the state, we will obtain nine copies of each bit of . Similarly, the super key for the right half contains five bits of . Additionally, there are other bits in the super key as well. Thus, over all sixteen bits of and , we obtain:
for .
The redundancy above allows us to better estimate the individual key bits, and we estimate each of the 48 independent key bits by a majority vote from the corresponding multiple copies. In any experiment, we get three outcomes: correctly determined bits, incorrectly determined bits and undetermined bits (when the outcome is a tie).
Finally, we will have 16 bits of , 16 bits of , and 16 bits of , for a total of 48 independent key bits. We may use estimates of bits of to estimate bits of , and then to estimate bits of . We note that the error increases as we go from through ; not only because the number of copies of the required bits decreases, but because the error is compounded (the error in determining is increased due to errors in estimating and ).
4.4. The Construction of Super Rounds and Derivations of Super Keys
Here, we demonstrate how the super rounds are constructed for
Simon cipher, beginning with
Simon 32/64 and going on to other variants [
21].
Since
Simon is designed based on a Feistel structure with the key-dependent round function, one round of
Simon can be expressed as:
which implies that:
Similarly,
and hence that:
Given the round function of
Simon:
which implies that:
giving us:
where:
Recall the Simon family consists of another nine variants of the cipher differing in their block and key sizes. All Simon variants share the same round function; hence the observation enabling us to construct super-rounds in Simon 32/64 continues to be valid. Even though the larger variants of Simon correspond to larger block and key sizes, we have found that the size of the super keys is only slightly larger than that for Simon 32/64. After four round of encryption, a single bit of the left-half of the intermediate state is influenced by only 18 key bits. On the other hand, the size of the super-key of the right half stays the same, at seven bits.
In
Simon 32/64, we have nine bits of
, for
, as shown in
Table 5, where in
Simon 48 we have 11 bits of
, for
, and in
Simon 64 we have a similar set of bits, except instead of
, we have
. This difference arises from computing
, where we have the similar computations for
, and
. In larger
Simon, we get:
where,
It is clear from the equations that in the case of , we get and from evaluating , and . In the case of , we get and .
The value
affects the super key bit
, which becomes in the case of larger
Simon,
. The other components of the super key for the left half, are consistent with the bits presented in
Table 5. See Algorithm 1 for pseudocode for our attack on
Simon 32/64, using the left half system of approximation.
Algorithm 1 Matsui’s second algorithm using multiple linear approximations. |
Let T be the number of plaintexts such that the linear approximation is True. for i = 0, …, do ▹ evaluate the linear approximation for the left word for j = 0, …, do ▹ try all 16-bit keys Initialize T with zero for all N plaintext–ciphertext pairs do calculate using super round if linear approximation is True then increment T end if end for Calculate = end for output the candidate key j with the highest bias end for
|
6. Experimental Verification
To validate our proposed linear cryptanalysis of Simon 32/64, we conducted a number of experiments for the 8-round, 10-round, and 12-round linear attacks, which we summarize in this section.
We will need some additional notation. As mentioned before, the super key of the left-half is of size 16 bits, each bit being in one of three forms (recall
Table 5):
,
, or
. We denote the 16-bit strings of bits of this form (for
) as
,
, and
respectively.
We determine
,
and
from the super key estimates using a majority vote for error correction. We then compute the 48 master key bits (
,
, and
) using Equation (
10).
In all cases—8, 10 and 12 round attacks—
is determined with the greatest accuracy, then
, and, last,
. This is to be expected because there are more copies of
(nine) than
(five), and
has the fewest copies (two). In all cases,
is computed more accurately than
, which is more accurately computed than
. This is because
,
and
are computed from one, two and three values of the estimated values of super key bits. Additionally,
is computed from the most accurately estimated super key bits,
;
from
and
;
from
,
and
.
Table 6,
Table 7 and
Table 8 compare between the number of super key bits guessed correctly in the 8-round, 10-round and 12-round attacks respectively.
6.1. Experimental Results
6.1.1. 8-Round Attack
We carried out 14 instances of the 8-round attack, with P/C pairs and keys chosen at random. We observed that obtaining estimates of the super key bits corresponding to the right half of the state does not improve the estimate over using only those obtained from the left half state.
This is likely because the bias for the right half is half that of the left half, and hence the right half data is noisier and not particularly useful.
Figure 7 shows the results achieved using super rounds corresponding to the left half and to the left and right halves.
6.1.2. 10-Round Attack
We carried out 14 instances of the 10-round attack, each with a key chosen at random and plaintext/ciphertext pairs. In addition to the super keys (48 bits), we recover the last round key (16-bits), which is denoted as , hence we retrieve a total of 64 key bits. We find that the last round key bits are not independent, so we do not obtain 64 independent bits.
In contrast to the 8-round attack, we obtain better overall results by using super rounds corresponding to both right and left halves, as compared to using only the left half. The improvement is especially noticeable in the estimate of
. The reason is that we receive 96 bits (
) of
from the right half and only 32 bits (
) from the left-half. Thus, even though the right-half attacks have a lower bias, having a larger number of copies of
bits results in better estimation.
Figure 8 shows the improvements of the results obtained using super rounds corresponding to both right and left halves over using the left half only.
6.1.3. 12-Round Attack
We performed three instances of the 12-round attack using plaintext and ciphertext pairs. We got similar results in the case we use the estimates of the super key bits corresponding to only the left half and in the case, we combine the estimates corresponding to both halves. As in the 8-round attack, the right half of the state doesn’t improve the overall results, hence we obtain the same results using the left half and the two halves. In the three experiments, we can determine correctly 48, 47 and 45 key bits.
6.2. The Deduction of from
The 64-bit master key is used directly for the first four rounds; thereafter, the
Simon key schedule generates all other round keys from the 64-bit master key. We are able to express
in terms of
,
,
, and
as follows:
Thus, on determining
,
,
and
, we obtain the 16 bit string
, which we denote
. Note that the bits of
are not independent, because
Thus only 12 bits of are independent, enabling us to determine up to 12 bits of . For fixed values of , and , there is a one-to-one correspondence between and . Thus, only 12 bits of are independent, and all possible values of will not be generated by the key schedule. Because of this, in addition to the 48 master key bits computed from the super key, we are able to deduce up to 12 bits of for a total of up to 60 master key bits.
6.3. 8-Round Attack without Approximations
Based on the Feistel symmetry of Simon, we are able to establish a four-round decryption super round in addition to the encryption super round we describe above. This allows us to launch a meet-in-the-middle attack on 8-round Simon 32/64 without any approximations. Instead of performing an exhaustive search over a large number of master key bits, we can focus on a single bit and perform an exhaustive search over fewer key bits at a time.
The encryption super round
takes the plaintext and 16 key bits of super key
to produce a single bit of four-round encryption
(modulo a single key bit). The decryption super round
takes the ciphertext and 8 key bits of super key
to generate a single bit of four-round decryption, see
Figure 9. For every bit of intermediate state
i, the adversary computes
and
for all possible values of encryption super key
and decryption super key
respectively. If there isn’t a match between the two operations, the pair
is discarded as a possible candidate for the correct key. As all expressions are exact, there is no need to keep a count of how many times there was a match; a single mismatch disqualifies the key pair.
In this meet-in-the-middle attack on 8-round Simon, we attempt to recover 112 key bits, consisting of 64 bits of one super key and 48 more bits of the second super key. We are able to determine all 64 master key bits using only 48 plaintext and ciphertext pairs. We carried out two instances of this attack.
6.4. Summary of Experimental Results
Here we provide a summary of our experimental results (see
Table 9).
8. The Effect of Super Rounds on Larger Variants of Simon
Although the larger variants of Simon correspond to larger block and key sizes, we have found that the size of the super-keys is only slightly larger than that for Simon 32/64. After four-round encryption, a single bit of the left-half of the intermediate state is influenced by only 18 key bits. On the other hand, the size of the super-key of the right half stays the same, at seven bits.
We found that, for larger variants of Simon, the bias of linear approximations with only a single active bit in the input mask is very low. We looked for approximations with a higher bias that uses a very small number of active bits in the input mask. Thus, we may not be using the linear trails with the highest bias, but we need to realize an acceptable trade-off between the bias and the number of active bits of especially the left half, because appending the super round, in this case, is more expensive.
For Simon 48, we derived linear approximations with high bias that have three active bits in the input mask, one bit for the left half and two bits of the right half. Appending three super rounds to these approximations requires the guessing of 24 key bits, the size of one round key.
For Simon 64, we derived a linear trail with four active bits of input, one of the left half and three bits of the right half, requiring the guessing of 31 key bits with appended super rounds. This is smaller than a single round key. In Simon 96, and Simon 128, we obtain linear approximations that need the guessing of 41 and 53 key bits respectively, which, in both cases, are smaller than a single round key in these variants.