Related-Key Impossible-Differential Attack on Reduced-Round SKINNY

Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with the NSA designs SIMON and SPECK. SKINNY can be implemented efficiently in both soft- and hardware and supports block sizes of 64 and 128 bits as well as tweakey sizes of 64, 128, 192 and 128, 256, 384 bits respectively. This paper presents a related-tweakey impossible-differential attack on up to 23 (out of 36) rounds of SKINNY-64/128 for different tweak sizes. All our attacks can be trivially extended to SKINNY-128/128.
Originalspracheenglisch
TitelApplied Cryptography and Network Security
ErscheinungsortCham
Seiten208-228
ISBN (elektronisch)978-3-319-61204-1
DOIs
PublikationsstatusVeröffentlicht - 2017
Veranstaltung15th International Conference on Applied Cryptography and Network Security: ACNS 2017 - Kanazawa, Japan
Dauer: 10 Juli 201712 Juli 2017
Konferenznummer: 15

Publikationsreihe

NameLecture Notes in Computer Science
Band10355

Konferenz

Konferenz15th International Conference on Applied Cryptography and Network Security
KurztitelACNS
Land/GebietJapan
OrtKanazawa
Zeitraum10/07/1712/07/17

Fingerprint

Untersuchen Sie die Forschungsthemen von „Related-Key Impossible-Differential Attack on Reduced-Round SKINNY“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren