Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE

  • Lorenzo Grassi
  • , Christian Rechberger

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

446 Downloads (Orbit)

Abstract

Subspace trail cryptanalysis is a very recent new cryptanalysis technique, and includes differential, truncated differential, impossible differential, and integral attacks as special cases.

In this paper, we consider PRINCE, a widely analyzed block cipher proposed in 2012. After the identification of a 2.5 rounds subspace trail of PRINCE, we present several (truncated differential) attacks up to 6 rounds of PRINCE. This includes a very practical attack with the lowest data complexity of only 8 plaintexts for 4 rounds, which co-won the final round of the PRINCE challenge in the 4-round chosen-plaintext category. The attacks have been verified using a C implementation.

Of independent interest, we consider a variant of PRINCE in which ShiftRows and MixLayer operations are exchanged in position. In particular, our result shows that the position of ShiftRows and MixLayer operations influences the security of PRINCE. The same analysis applies to follow-up designs inspired by PRINCE.
Original languageEnglish
Title of host publicationProgress in Cryptology – INDOCRYPT 2016 : Proceedings of the 17th International Conference on Cryptology in India
PublisherSpringer
Publication date2016
Pages322-342
ISBN (Print)978-3-319-49889-8
ISBN (Electronic)978-3-319-49890-4
DOIs
Publication statusPublished - 2016
Event17th International Conference on Cryptology in India - Kolkata, India
Duration: 11 Dec 201614 Dec 2016
Conference number: 17
http://indocrypt2016.iiitd.edu.in/

Conference

Conference17th International Conference on Cryptology in India
Number17
Country/TerritoryIndia
CityKolkata
Period11/12/201614/12/2016
Internet address
SeriesLecture Notes in Computer Science
Volume10095
ISSN0302-9743

Keywords

  • PRINCE
  • Subspace trails cryptanalysis
  • Invariant subspace attack
  • Truncated differential attack
  • Practical attack
  • MANTIS

Fingerprint

Dive into the research topics of 'Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE'. Together they form a unique fingerprint.

Cite this