Impossible Differential Analysis on 8-Round PRINCE

Yaoling Ding, Keting Jia*, An Wang, Ying Shi

*此作品的通讯作者

科研成果: 书/报告/会议事项章节会议稿件同行评审

1 引用 (Scopus)

摘要

PRINCE is a lightweight block cipher, which was proposed by Borghoff et al. in Asiacrypt 2012. Various cryptanalytic techniques have been employed to evaluate the security of PRINCE. In 2017, Ding et al. constructed a 4-round impossible differential based on some observations on M′ operation and launched impossible differential attacks on 6- and 7-round PRINCE and the underlying PRINCEcore. In this paper, we explore the differential distribution table (DDT) of the S-box employed in PRINCE and construct a more detailed DDT which contains the input/output values corresponding to each differential. Taking advantage of the table, we compute the subkeys instead of guessing them. With this technique, we extend the impossible differential attacks of PRINCE and PRINCEcore to eight rounds. The corresponding computational and complexities are 110.7 and 62.26 encryptions, respectively, which are much less than exhaustive search. And the data complexities are 64 and 60 chosen plaintexts, respectively.

源语言英语
主期刊名Proceedings of the 9th International Conference on Computer Engineering and Networks, CENet2019
编辑Qi Liu, Xiaodong Liu, Lang Li, Hui-Huang Zhao, Huiyu Zhou
出版商Springer
383-395
页数13
ISBN(印刷版)9789811537523
DOI
出版状态已出版 - 2021
活动9th International Conference on Computer Engineering and Networks, CENet2019 - Changsha, 中国
期限: 18 10月 201920 10月 2019

出版系列

姓名Advances in Intelligent Systems and Computing
1143
ISSN(印刷版)2194-5357
ISSN(电子版)2194-5365

会议

会议9th International Conference on Computer Engineering and Networks, CENet2019
国家/地区中国
Changsha
时期18/10/1920/10/19

指纹

探究 'Impossible Differential Analysis on 8-Round PRINCE' 的科研主题。它们共同构成独一无二的指纹。

引用此