Abstract
Subspace trail cryptanalysis is a very recent new cryptanalysis technique, and includes differential, truncated differential, impossible differential, and integral attacks as special cases.
In this paper, we consider PRINCE, a widely analyzed block cipher proposed in 2012. After the identification of a 2.5 rounds subspace trail of PRINCE, we present several (truncated differential) attacks up to 6 rounds of PRINCE. This includes a very practical attack with the lowest data complexity of only 8 plaintexts for 4 rounds, which co-won the final round of the PRINCE challenge in the 4-round chosen-plaintext category. The attacks have been verified using a C implementation.
Of independent interest, we consider a variant of PRINCE in which ShiftRows and MixLayer operations are exchanged in position. In particular, our result shows that the position of ShiftRows and MixLayer operations influences the security of PRINCE. The same analysis applies to follow-up designs inspired by PRINCE.
In this paper, we consider PRINCE, a widely analyzed block cipher proposed in 2012. After the identification of a 2.5 rounds subspace trail of PRINCE, we present several (truncated differential) attacks up to 6 rounds of PRINCE. This includes a very practical attack with the lowest data complexity of only 8 plaintexts for 4 rounds, which co-won the final round of the PRINCE challenge in the 4-round chosen-plaintext category. The attacks have been verified using a C implementation.
Of independent interest, we consider a variant of PRINCE in which ShiftRows and MixLayer operations are exchanged in position. In particular, our result shows that the position of ShiftRows and MixLayer operations influences the security of PRINCE. The same analysis applies to follow-up designs inspired by PRINCE.
| Original language | English |
|---|---|
| Title of host publication | Progress in Cryptology – INDOCRYPT 2016 : Proceedings of the 17th International Conference on Cryptology in India |
| Publisher | Springer |
| Publication date | 2016 |
| Pages | 322-342 |
| ISBN (Print) | 978-3-319-49889-8 |
| ISBN (Electronic) | 978-3-319-49890-4 |
| DOIs | |
| Publication status | Published - 2016 |
| Event | 17th International Conference on Cryptology in India - Kolkata, India Duration: 11 Dec 2016 → 14 Dec 2016 Conference number: 17 http://indocrypt2016.iiitd.edu.in/ |
Conference
| Conference | 17th International Conference on Cryptology in India |
|---|---|
| Number | 17 |
| Country/Territory | India |
| City | Kolkata |
| Period | 11/12/2016 → 14/12/2016 |
| Internet address |
| Series | Lecture Notes in Computer Science |
|---|---|
| Volume | 10095 |
| ISSN | 0302-9743 |
Keywords
- PRINCE
- Subspace trails cryptanalysis
- Invariant subspace attack
- Truncated differential attack
- Practical attack
- MANTIS
Fingerprint
Dive into the research topics of 'Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver