[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
This repository has been archived by the owner on Jun 3, 2021. It is now read-only.
/ simon-speck Public archive

The SIMON and SPECK families of lightweight block ciphers. #nsacyber

License

Notifications You must be signed in to change notification settings

nsacyber/simon-speck

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 

Repository files navigation

The SIMON and SPECK Families of Block Ciphers

SIMON and SPECK are families of lightweight block ciphers, each of which comes in a variety of widths and key sizes. The aim of SIMON and SPECK is to fill the need for secure, flexible, and analyzable lightweight block ciphers that perform well on a wide range of current and future platforms.

This repository hosts general information about the algorithms with pointers to more detailed information available in other repositories or papers. The newest publication update can be found here: SIMON and SPECK 6 Mar 2019

Presentations and Papers

Implementations

The implementation guide provides reference code for SIMON and SPECK(64- and 128-bit block sized variants), including code for key scheduling, encryption, and decryption. It also describes the intended word ordering, and provides detailed test vectors and useful tips for improving performance on some ARM and x86 processors.

Higher-end Software

The simon-speck-supercop repository includes X86 and ARM implementations using the SSE4.2, AVX2, and NEON instruction sets for high performance. While the implementations are structured for the SUPERCOP benchmarking toolkit, they should be adaptable to other systems.

Microcontrollers

The University of Luxembourg Fair Evaluation of Lightweight Cryptographic Systems (FELICS) project includes our contributions of a range of small and fast implementations of SIMON and SPECK for the 8-bit AVR, 16-bit MSP430, and 32-bit Cortex-M microcontrollers.

ASICs and FPGAs

We have unreleased implementations of SIMON and SPECK for ASICs and FPGAs that have been documented in our papers. The team is glad to answer questions about ASIC and FPGA implementation of the algorithms.

Contact Us

SIMON and SPECK are products of the National Security Agency's Research Directorate, produced as part of our Information Assurance research mission. Contact one of the following members of the SIMON and SPECK team with any questions:

Name Email
Ray Beaulieu rayb@ccrwest.org
Doug Shors djshors@tycho.ncsc.mil
Jason Smith jksmit3@tycho.ncsc.mil
Stefan Treatman-Clark sgtreat@tycho.ncsc.mil
Bryan Weeks beweeks@tycho.ncsc.mil
Louis Wingers lrwinge@tycho.ncsc.mil

Intellectual Property

SIMON and SPECK are free from any intellectual property restrictions.

This Work was prepared by a United States Government employee and, therefore, is excluded from copyright by Section 105 of the Copyright Act of 1976.

Copyright and Related Rights in the Work worldwide are waived through the CC0 1.0 Universal license.

Disclaimer

See DISCLAIMER.