Reference : Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
http://hdl.handle.net/10993/20039
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
English
Derbez, Patrick [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Perrin, Léo Paul mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Mar-2015
Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, March 8-11, 2015
Leander, Gregor
Springer-Verlag
Security and Cryptology, 9054
190-216
Yes
International
978-3-662-48115-8
Berlin
Germany
22nd International Workshop on Fast Software Encryption
from 08-03-2015 to 11-03-2015.
[en] PRINCE ; Differential cryptanalysis ; SAT-solver ; Meet-in-the-Middle attack
[en] NXP Semiconductors and its academic partners challenged the cryptographic community with finding practical attacks on the block cipher they designed, PRINCE. Instead of trying to attack as many rounds as possible using attacks which are usually impractical despite being faster than brute-force, the challenge invites cryptographers to find practical attacks and encourages them to actually implement them.

In this paper, we present new attacks on round-reduced PRINCE including the ones which won the challenge in the 6 and 8-round categories --- the highest for which winners were identified. Our first attacks rely on a meet-in-the-middle approach and break up to 10 rounds of the cipher. We also describe heuristic methods we used to find practical SAT-based and differential attacks.

Finally, we also present an analysis of the cycle structure of the internal rounds of PRINCE leading both to a low complexity distinguisher for 4-round PRINCE-core and an alternative representation of the cipher valid in particular contexts and which highlights, in this cases, a poor diffusion.
Fonds National de la Recherche - FnR
I2R-DIR-PFN-12ACRY > CORE 2012 C12/IS/4009992 ACRYPT - APllied Cryptography for I > 01/07/2013 - 30/06/2016 > BIRYUKOV Alex
Researchers
http://hdl.handle.net/10993/20039

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Limited access
prince.pdfAuthor preprint525.92 kBRequest a copy

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.