<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2227-1899</journal-id>
<journal-title><![CDATA[Revista Cubana de Ciencias Informáticas]]></journal-title>
<abbrev-journal-title><![CDATA[RCCI]]></abbrev-journal-title>
<issn>2227-1899</issn>
<publisher>
<publisher-name><![CDATA[Editorial Ediciones Futuro]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2227-18992023000100031</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Criptoanálisis algebraico a los cifrados en bloques ligeros SIMON y SIMECK]]></article-title>
<article-title xml:lang="en"><![CDATA[Algebraic cryptanalysis of the lightweight block ciphers SIMON and SIMECK]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Labrada Claro]]></surname>
<given-names><![CDATA[Roberto]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Borges Trenard]]></surname>
<given-names><![CDATA[Miguel Angel]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Borges Quintana]]></surname>
<given-names><![CDATA[Mijail]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad de Oriente Facultad de Ciencias Naturales y Exactas Departamento de Matemática]]></institution>
<addr-line><![CDATA[ Santiago de Cuba]]></addr-line>
<country>Cuba</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Antonio Nariño Doctorate in Mathematics Education ]]></institution>
<addr-line><![CDATA[ Bogotá]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Universidad de Oriente Facultad de Ciencias Naturales y Exactas Departamento de Matemática]]></institution>
<addr-line><![CDATA[ Santiago de Cuba]]></addr-line>
<country>Cuba</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>03</month>
<year>2023</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>03</month>
<year>2023</year>
</pub-date>
<volume>17</volume>
<numero>1</numero>
<fpage>31</fpage>
<lpage>44</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_arttext&amp;pid=S2227-18992023000100031&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_abstract&amp;pid=S2227-18992023000100031&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_pdf&amp;pid=S2227-18992023000100031&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen El campo de la Criptografía Ligera es relativamente nuevo, su esencia consiste en la necesidad de encontrar compromisos entre ligereza y seguridad. En este trabajo se realizó un estudio de SIMON y SIMECK, los cuales son cifrados en bloques ligeros. Se halló la modelación algebraica de estas importantes operaciones de cifrado y fueron programados y aplicados ataques algebraico sobre estos cifrados. Se comparan los resulta dos con los obtenidos por otros autores; llegando a conclusiones concernientes a las bases de Grobner y los sistemas &#8220;SAT-solvers&#8221;.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract The field of Lightweight Cryptography is relatively new, its essence is the need to find compromises between lightness and security. In this work, a study of SIMON and SIMECK was carried out, which are lightweight blocks ciphers. The algebraic modeling of these important encryption operations was found and algebraic attacks on these encryptions were programmed and applied. The results are compared with those obtained by other authors; reaching conclusions concerning the Grobner bases and &#8220;SAT-solvers&#8221; systems.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[criptografía ligera]]></kwd>
<kwd lng="es"><![CDATA[criptoanálisis algebraico]]></kwd>
<kwd lng="es"><![CDATA[sistemas &#8220;SAT-solvers&#8221;]]></kwd>
<kwd lng="en"><![CDATA[lightweight cryptography]]></kwd>
<kwd lng="en"><![CDATA[algebraic cryptanalysis]]></kwd>
<kwd lng="en"><![CDATA[&#8220;SAT-solvers&#8221; systems]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abed]]></surname>
<given-names><![CDATA[Sa&#8217;ed]]></given-names>
</name>
<name>
<surname><![CDATA[Jaffal]]></surname>
<given-names><![CDATA[Reem]]></given-names>
</name>
<name>
<surname><![CDATA[Mohd]]></surname>
<given-names><![CDATA[Bassam Jamil]]></given-names>
</name>
<name>
<surname><![CDATA[Alshayeji]]></surname>
<given-names><![CDATA[Mohammad]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fpga modeling and optimization of a simon lightweight block cipher]]></article-title>
<source><![CDATA[Sensors]]></source>
<year>2019</year>
<volume>19</volume>
<numero>4</numero>
<issue>4</issue>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[AlKhzaimi]]></surname>
<given-names><![CDATA[Hoda]]></given-names>
</name>
<name>
<surname><![CDATA[Lauridsen]]></surname>
<given-names><![CDATA[Martin M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cryptanalysis of the simon family of block ciphers]]></article-title>
<source><![CDATA[IACR Cry ptology ePrint Archive]]></source>
<year>2013</year>
<volume>2013</volume>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Astrid]]></surname>
<given-names><![CDATA[Berghult]]></given-names>
</name>
</person-group>
<source><![CDATA[A practical comparison between algebraic and statistical attacks on the lightweight cipher simon]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Beaulieu]]></surname>
<given-names><![CDATA[Ray]]></given-names>
</name>
<name>
<surname><![CDATA[Treatman-Clark]]></surname>
<given-names><![CDATA[Stefan]]></given-names>
</name>
<name>
<surname><![CDATA[Shors]]></surname>
<given-names><![CDATA[Douglas]]></given-names>
</name>
<name>
<surname><![CDATA[Weeks]]></surname>
<given-names><![CDATA[Bryan]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[Jason]]></given-names>
</name>
<name>
<surname><![CDATA[Wingers]]></surname>
<given-names><![CDATA[Louis]]></given-names>
</name>
</person-group>
<source><![CDATA[The si mon and speck lightweight block ciphers]]></source>
<year>2015</year>
<conf-name><![CDATA[ 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), 1-6]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Becejac]]></surname>
<given-names><![CDATA[Vladimir]]></given-names>
</name>
<name>
<surname><![CDATA[Stefanov]]></surname>
<given-names><![CDATA[Predrag]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Groebner bases algorithm for optimal pmu placement]]></article-title>
<source><![CDATA[International Journal of Electrical Power &amp; Energy Systems]]></source>
<year>2020</year>
<volume>115</volume>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Claro]]></surname>
<given-names><![CDATA[R. Labrada]]></given-names>
</name>
</person-group>
<source><![CDATA[Criptoanálisis algebraico a cifrados en bloques ligeros]]></source>
<year>2018</year>
<publisher-loc><![CDATA[Cuba ]]></publisher-loc>
<publisher-name><![CDATA[Universidad de La Habana]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dehnavi]]></surname>
<given-names><![CDATA[Seyed Mojtaba]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Further observations on simon and speck block cipher families]]></article-title>
<source><![CDATA[Cryptography]]></source>
<year>2018</year>
<volume>3</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gomes]]></surname>
<given-names><![CDATA[Carla P]]></given-names>
</name>
<name>
<surname><![CDATA[Kautz]]></surname>
<given-names><![CDATA[Henry]]></given-names>
</name>
<name>
<surname><![CDATA[Sabharwal]]></surname>
<given-names><![CDATA[Ashish]]></given-names>
</name>
<name>
<surname><![CDATA[Selman]]></surname>
<given-names><![CDATA[Bart]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Satisfiability solvers]]></article-title>
<source><![CDATA[Foundations of Artificial Intelligence]]></source>
<year>2008</year>
<volume>3</volume>
<page-range>89-134</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hatzivasilis]]></surname>
<given-names><![CDATA[George]]></given-names>
</name>
<name>
<surname><![CDATA[Fysarakis]]></surname>
<given-names><![CDATA[Konstantinos]]></given-names>
</name>
<name>
<surname><![CDATA[Papaefstathiou]]></surname>
<given-names><![CDATA[Ioannis]]></given-names>
</name>
<name>
<surname><![CDATA[Manifavas]]></surname>
<given-names><![CDATA[Charalampos]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A review of lightweight block ciphers]]></article-title>
<source><![CDATA[Journal of cryptographic Engineering]]></source>
<year>2018</year>
<volume>8</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>141-84</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[K Kranthi]]></surname>
<given-names><![CDATA[Kumar]]></given-names>
</name>
<name>
<surname><![CDATA[B]]></surname>
<given-names><![CDATA[Srikanth]]></given-names>
</name>
<name>
<surname><![CDATA[Y]]></surname>
<given-names><![CDATA[Kasiviswanadham]]></given-names>
</name>
<name>
<surname><![CDATA[Subbarao]]></surname>
<given-names><![CDATA[Ch DV]]></given-names>
</name>
<name>
<surname><![CDATA[DNVSLS]]></surname>
<given-names><![CDATA[Indira]]></given-names>
</name>
<name>
<surname><![CDATA[NL]]></surname>
<given-names><![CDATA[Pratap]]></given-names>
</name>
</person-group>
<source><![CDATA[The importance of light-weight encryption cipher in restricted iot systems to make intelligent technology safer for devices]]></source>
<year>2021</year>
<page-range>1-11</page-range><publisher-name><![CDATA[Applied Nanoscience]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Leurent]]></surname>
<given-names><![CDATA[Gaetan]]></given-names>
</name>
<name>
<surname><![CDATA[Pernot]]></surname>
<given-names><![CDATA[Clara]]></given-names>
</name>
<name>
<surname><![CDATA[Schrottenloher]]></surname>
<given-names><![CDATA[Andre]]></given-names>
</name>
</person-group>
<source><![CDATA[Clustering effect in simon and simeck]]></source>
<year>2021</year>
<conf-name><![CDATA[ Interna tional Conference on the Theory and Application of Cryptology and Information Security, 272-302]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Hang]]></given-names>
</name>
<name>
<surname><![CDATA[Ren]]></surname>
<given-names><![CDATA[Jiongjiong]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Shaozhen]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Improved integral attack on reduced-round simeck]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2019</year>
<volume>7</volume>
<page-range>118806-14</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Jiajie]]></given-names>
</name>
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[Bing]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Chao]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[New approach towards generalizing feistel networks and its provable security]]></article-title>
<source><![CDATA[Security and Communication Networks]]></source>
<year>2021</year>
<volume>2021</volume>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[M.A. Borges-Trenard]]></surname>
<given-names><![CDATA[R. Labrada-Claro]]></given-names>
</name>
</person-group>
<source><![CDATA[Ataque algebraico a cinco rondas del cifrado en bloques simon]]></source>
<year>2017</year>
<conf-name><![CDATA[ Congreso Internacional Compumat]]></conf-name>
<conf-loc>La Habana, Cuba </conf-loc>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nayancy]]></surname>
<given-names><![CDATA[Sandip Dutta]]></given-names>
</name>
<name>
<surname><![CDATA[Soubhik]]></surname>
<given-names><![CDATA[Chakraborty]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey on implementation of lightweight block ciphers for resource constraints devices]]></article-title>
<source><![CDATA[Journal of Discrete Mathematical Sciences andCryptography]]></source>
<year>2022</year>
<volume>25</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>1377-98</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rohit]]></surname>
<given-names><![CDATA[Raghvendra]]></given-names>
</name>
<name>
<surname><![CDATA[Gong]]></surname>
<given-names><![CDATA[Guang]]></given-names>
</name>
</person-group>
<source><![CDATA[Correlated sequence attack on reduced-round simon-32/64 and simeck- 32/64]]></source>
<year>2018</year>
<publisher-name><![CDATA[Cryptology ePrint Archive]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sadeghi]]></surname>
<given-names><![CDATA[Sadegh]]></given-names>
</name>
<name>
<surname><![CDATA[Bagheri]]></surname>
<given-names><![CDATA[Nasour]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Security analysis of simeck block cipher against related-key impossible differential]]></article-title>
<source><![CDATA[Information Processing Letters]]></source>
<year>2019</year>
<volume>147</volume>
<page-range>14-21</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sehrawat]]></surname>
<given-names><![CDATA[Deepti]]></given-names>
</name>
<name>
<surname><![CDATA[Gill]]></surname>
<given-names><![CDATA[Nasib Singh]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Lightweight block ciphers for iot based applications: a review]]></article-title>
<source><![CDATA[Inter national Journal of Applied Engineering Research]]></source>
<year>2018</year>
<volume>13</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>2258-70</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[Gangqiang]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[Bo]]></given-names>
</name>
<name>
<surname><![CDATA[Suder]]></surname>
<given-names><![CDATA[Valentin]]></given-names>
</name>
<name>
<surname><![CDATA[Aagaard]]></surname>
<given-names><![CDATA[Mark D]]></given-names>
</name>
<name>
<surname><![CDATA[Gong]]></surname>
<given-names><![CDATA[Guang]]></given-names>
</name>
</person-group>
<source><![CDATA[The simeck family of light weight block ciphers]]></source>
<year>2015</year>
<conf-name><![CDATA[ International Workshop on Cryptographic Hardware and Embedded Systems, 307-329]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yeo]]></surname>
<given-names><![CDATA[Sze Ling]]></given-names>
</name>
<name>
<surname><![CDATA[Le]]></surname>
<given-names><![CDATA[Duc-Phong]]></given-names>
</name>
<name>
<surname><![CDATA[Khoo]]></surname>
<given-names><![CDATA[Khoongming]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Improved algebraic attacks on lightweight block ciphers]]></article-title>
<source><![CDATA[Journal of cryptographic Engineering]]></source>
<year>2021</year>
<volume>11</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-19</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[Jinbao]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Jiehua]]></given-names>
</name>
<name>
<surname><![CDATA[Bin]]></surname>
<given-names><![CDATA[Ge]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Jianhua]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An efficient differential fault attack against simon key schedule]]></article-title>
<source><![CDATA[Journal of Information Security and Applications]]></source>
<year>2022</year>
<volume>66</volume>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
