Related-key impossible-differential attack on reduced-round skinny

  • Ralph Ankele*
  • , Subhadeep Banik
  • , Avik Chakraborti
  • , Eik List
  • , Florian Mendel
  • , Siang Meng Sim
  • , Gaoli Wang
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

26 Scopus citations

Abstract

At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with the NSA designs SIMON and SPECK. SKINNY can be implemented efficiently in both soft- and hardware and supports block sizes of 64 and 128 bits as well as tweakey sizes of 64, 128, 192 and 128, 256, 384 bits respectively. This paper presents a related-tweakey impossible-differential attack on up to 23 (out of 36) rounds of SKINNY-64/128 for different tweak sizes. All our attacks can be trivially extended to SKINNY-128/128.

Original languageEnglish
Title of host publicationApplied Cryptography and Network Security - 15th International Conference, ACNS 2017, Proceedings
EditorsDieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi
PublisherSpringer Verlag
Pages208-228
Number of pages21
ISBN (Print)9783319612034
DOIs
StatePublished - 2017
Event15th International Conference on Applied Cryptography and Network Security, ACNS 2017 - Kanazawa, Japan
Duration: 10 Jul 201712 Jul 2017

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10355 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference15th International Conference on Applied Cryptography and Network Security, ACNS 2017
Country/TerritoryJapan
CityKanazawa
Period10/07/1712/07/17

Keywords

  • Cryptanalysis
  • Impossible differential
  • Lightweight cryptography
  • Symmetric cryptography
  • Tweakable block cipher

Fingerprint

Dive into the research topics of 'Related-key impossible-differential attack on reduced-round skinny'. Together they form a unique fingerprint.

Cite this