Impossible differential attacks on the SKINNY family of block ciphers

被引:21
|
作者
Yang, Dong [1 ]
Qi, Wen-Feng [1 ]
Chen, Hua-Jin [1 ]
机构
[1] Natl Digital Switching Syst Engn & Technol Res Ct, POB 407,62 Kexue Rd, Zhengzhou 450001, Henan, Peoples R China
关键词
cryptography; greedy algorithms; impossible differential attacks; lightweight block ciphers; CRYPTO; 2016; TWEAKEY framework; tweakey input; differential cryptanalysis; linear cryptanalysis; early-abort technique; greedy strategy; SKINNY-n-k; SKINNY cipher; n-bit block size; k-bit tweakey size; 17-round SKINNY-64-64; SKINNY-128-128; 17-round encryptions; 19-round SKINNY-64-128; SKINNY-128-256; 19-round encryptions; 21-round SKINNY-64-192; SKINNY-128-384; 21-round encryptions; CRYPTANALYSIS; ROUNDS;
D O I
10.1049/iet-ifs.2016.0488
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SKINNY is a family of lightweight block ciphers proposed at CRYPTO 2016, which follows the TWEAKEY framework and takes a tweakey input. It is shown that SKINNY family not only has good hardware/software performances, but also provides strong security guarantees against differential/linear cryptanalysis. In this study, the authors study the security of SKINNY against the impossible differential attack. First, they get some properties of the subkeys of SKINNY by analysing its key schedule. Then, combining with the early-abort technique and the greedy strategy, they present impossible differential attacks on SKINNY based on an 11-round impossible differential. Let SKINNY-n-k be the SKINNY cipher with n-bit block size and k-bit tweakey size. On the basis of their method, 17-round SKINNY-64-64 (resp. SKINNY-128-128) can be broken in 261.8 (resp. 2120.8) 17-round encryptions, 19-round SKINNY-64-128 (resp. SKINNY-128-256) can be broken in 2119.8 (resp. 2241.8) 19-round encryptions and 21-round SKINNY-64-192 (resp. SKINNY-128-384) can be broken in 2180.5 (resp. 2353.6) 21-round encryptions. To the best of their knowledge, these results are currently the best results with respect to the attacked rounds.
引用
收藏
页码:377 / 385
页数:9
相关论文
共 50 条
  • [1] Generalized impossible differential attacks on block ciphers: application to SKINNY and ForkSKINNY
    Song, Ling
    Fu, Qinggan
    Yang, Qianqian
    Lv, Yin
    Hu, Lei
    DESIGNS CODES AND CRYPTOGRAPHY, 2025,
  • [2] Fault diagnosis architecture for SKINNY family of block ciphers
    Nallathambi, Bharathiraja
    Palanivel, Karthigaikumar
    MICROPROCESSORS AND MICROSYSTEMS, 2020, 77
  • [3] Quantum impossible differential attacks: applications to AES and SKINNY
    David, Nicolas
    Naya-Plasencia, Maria
    Schrottenloher, Andre
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (03) : 723 - 751
  • [4] Quantum impossible differential attacks: applications to AES and SKINNY
    Nicolas David
    María Naya-Plasencia
    André Schrottenloher
    Designs, Codes and Cryptography, 2024, 92 : 723 - 751
  • [5] The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
    Beierle, Christof
    Jean, Jeremy
    Koelbl, Stefan
    Leander, Gregor
    Moradi, Amir
    Peyrin, Thomas
    Sasaki, Yu
    Sasdrich, Pascal
    Sim, Siang Meng
    ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 123 - 153
  • [6] Cache attacks on block ciphers
    Zhao, Xinjie
    Wang, Tao
    Guo, Shize
    Liu, Huiying
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49 (03): : 453 - 468
  • [7] Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers
    Xuzi Wang
    Baofeng Wu
    Lin Hou
    Dongdai Lin
    Cybersecurity, 4
  • [8] Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers
    Wang, Xuzi
    Wu, Baofeng
    Hou, Lin
    Lin, Dongdai
    CYBERSECURITY, 2021, 4 (01)
  • [9] Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs
    Chakraborty, Debasmita
    Hadipour, Hosein
    Nguyen, Phuong Hoa
    Eichlseder, Maria
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (03) : 84 - 176
  • [10] Impossible differential cryptanalysis of SPN ciphers
    Li, R.
    Sun, B.
    Li, C.
    IET INFORMATION SECURITY, 2011, 5 (02) : 111 - 120