Biased differential distinguisher – Cryptanalysis of reduced-round SKINNY
Autor: | Stav Perle, Orr Dunkelman, Senyang Huang, Eran Lambooij |
---|---|
Rok vydání: | 2021 |
Předmět: |
Scheme (programming language)
Lightweight cryptography Differential cryptanalysis Computer science Differential (mechanical device) Computer Science Applications Theoretical Computer Science law.invention Computational Theory and Mathematics Computer engineering law NIST Cryptanalysis computer Information Systems computer.programming_language Block cipher |
Zdroj: | Information and Computation. 281:104796 |
ISSN: | 0890-5401 |
DOI: | 10.1016/j.ic.2021.104796 |
Popis: | SKINNY is a lightweight tweakable block cipher which received a great deal of cryptanalytic attention due to its elegant structure and efficiency. Despite the cryptanalytic efforts the security margins are remaining high. This has led to SKINNY being used as a component of multiple submissions in the NIST Lightweight Competition, an effort to standardize a lightweight AEAD scheme. Inspired by the SKINNY competitions, multiple attacks on it were reported in different settings (e.g. single vs. related-tweakey) using different techniques (impossible differentials, zero-correlation, meet-in-the-middle, etc.). In this paper we revisit some of these attacks, identify issues with several of them, and offer a series of improved attacks which were experimentally verified. Our best attack can attack up to 18 rounds of SKINNY -64 using 260 chosen plaintexts data, 2116 time, and 2112 memory. |
Databáze: | OpenAIRE |
Externí odkaz: |