Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition

被引:0
|
作者
Derbez, Patrick [1 ]
Lallemand, Virginie [2 ,3 ]
Udovenko, Aleksei [4 ,5 ]
机构
[1] Univ Rennes, CNRS, IRISA, Rennes, France
[2] Univ Lorraine, CNRS, INRIA, LORIA, Nancy, France
[3] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
[4] Univ Luxembourg, SnT, Esch Sur Alzette, Luxembourg
[5] Univ Luxembourg, CSC, Esch Sur Alzette, Luxembourg
来源
SELECTED AREAS IN CRYPTOGRAPHY - SAC 2019 | 2020年 / 11959卷
关键词
Cryptanalysis; SKINNY; Low data attack; Truncated differential; Higher order differential; Integral cryptanalysis;
D O I
10.1007/978-3-030-38471-5_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In April 2018, Beierle et al. launched the 3rd SKINNY crypt-analysis competition, a contest that aimed at motivating the analysis of their recent tweakable block cipher SKINNY. In contrary to the previous editions, the focus was made on practical attacks: contestants were asked to recover a 128-bit secret key from a given set of 2(20) plaintext blocks. The suggested SKINNY instances are 4- to 20-round reduced variants of SKINNY-64-128 and SKINNY-128-128. In this paper, we explain how to solve the challenges for 10-round SKINNY-128-128 and for 12-round SKINNY-64-128 in time equivalent to roughly 2(52) simple operations. Both techniques benefit from the highly biased sets of messages that are provided and that actually correspond to the encryption of various books in ECB mode.
引用
收藏
页码:124 / 145
页数:22
相关论文
共 8 条
  • [1] Impossible Differential Cryptanalysis of Reduced-Round SKINNY
    Tolba, Mohamed
    Abdelkhalek, Ahmed
    Youssef, Amr M.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2017, 2017, 10239 : 117 - 134
  • [2] Cryptanalysis of Reduced round SKINNY Block Cipher
    Sadeghi, Sadegh
    Mohammadi, Tahereh
    Bagheri, Nasour
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (03) : 124 - 162
  • [3] Low-Data Cryptanalysis On SKINNY Block Cipher
    Hua, Jialiang
    Liu, Tai
    Cui, Yulong
    Qin, Lingyue
    Dong, Xiaoyang
    Cui, Huiyong
    COMPUTER JOURNAL, 2023, 66 (04) : 970 - 986
  • [4] Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNY
    Shi, Danping
    Sun, Siwei
    Song, Ling
    Hu, Lei
    Yang, Qianqian
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT IV, 2023, 14007 : 67 - 97
  • [5] A framework for describing block cipher cryptanalysis
    Phan, Raphael C. -W.
    Siddiqi, Mohammad Umar
    IEEE TRANSACTIONS ON COMPUTERS, 2006, 55 (11) : 1402 - 1409
  • [6] Cryptanalysis of a Code-Based Identification Scheme Presented in CANS 2018
    Seck, Boly
    Cayrel, Pierre-Louis
    Diop, Idy
    Barbier, Morgan
    CRYPTOGRAPHY, CODES AND CYBER SECURITY, I4CS 2022, 2022, 1747 : 3 - 19
  • [7] Rotational-XOR Differential Cryptanalysis and an Automatic Framework for AND-RX Ciphers
    Zhang, Kai
    Lai, Xuejia
    Wang, Lei
    Guan, Jie
    Hu, Bin
    Wang, Senpeng
    Shi, Tairong
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (02) : 1282 - 1294
  • [8] Cryptanalysis of a Code-Based Signature Scheme Based on the Schnorr-Lyubashevsky Framework
    Baldi, Marco
    Deneuville, Jean-Christophe
    Persichetti, Edoardo
    Santini, Paolo
    IEEE COMMUNICATIONS LETTERS, 2021, 25 (09) : 2829 - 2833