Published June 26, 2017
| Version v1
Conference paper
Open
Related-Key Impossible-Differential Attack on Reduced-Round Skinny
Creators
- 1. Royal Holloway University of London
- 2. Nanyang Technological University
- 3. Indian Statistical Institut
- 4. Graz University of Technology
- 5. East China Normal University
Description
At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with the NSA designs SIMON and SPECK. SKINNY can be implemented efficiently in both soft- and hardware and supports block sizes of 64 and 128 bits as well as tweakey sizes of 64, 128, 192 and 128, 256, 384 bits respectively. This paper presents a related-tweakey impossible-differential attack on up to 23 (out of 36) rounds of SKINNY-64/128 for different tweak sizes. All our attacks can be trivially extended to SKINNY-128/128.
Files
2016-1127.pdf
Files
(611.9 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:ba61917d15d71d9d26e0c226b8fd3777
|
611.9 kB | Preview Download |