Abstract
At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with the NSA designs SIMON and SPECK. SKINNY can be implemented efficiently in both soft- and hardware and supports block sizes of 64 and 128 bits as well as tweakey sizes of 64, 128, 192 and 128, 256, 384 bits respectively. This paper presents a related-tweakey impossible-differential attack on up to 23 (out of 36) rounds of SKINNY-64/128 for different tweak sizes. All our attacks can be trivially extended to SKINNY-128/128.
Originalsprache | englisch |
---|---|
Titel | Applied Cryptography and Network Security |
Erscheinungsort | Cham |
Seiten | 208-228 |
ISBN (elektronisch) | 978-3-319-61204-1 |
DOIs | |
Publikationsstatus | Veröffentlicht - 2017 |
Veranstaltung | 15th International Conference on Applied Cryptography and Network Security: ACNS 2017 - Kanazawa, Japan Dauer: 10 Juli 2017 → 12 Juli 2017 Konferenznummer: 15 |
Publikationsreihe
Name | Lecture Notes in Computer Science |
---|---|
Band | 10355 |
Konferenz
Konferenz | 15th International Conference on Applied Cryptography and Network Security |
---|---|
Kurztitel | ACNS |
Land/Gebiet | Japan |
Ort | Kanazawa |
Zeitraum | 10/07/17 → 12/07/17 |