Published June 26, 2017 | Version v1
Conference paper Open

Related-Key Impossible-Differential Attack on Reduced-Round Skinny

  • 1. Royal Holloway University of London
  • 2. Nanyang Technological University
  • 3. Indian Statistical Institut
  • 4. Graz University of Technology
  • 5. East China Normal University

Description

At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with the NSA designs SIMON and SPECK. SKINNY can be implemented efficiently in both soft- and hardware and supports block sizes of 64 and 128 bits as well as tweakey sizes of 64, 128, 192 and 128, 256, 384 bits respectively. This paper presents a related-tweakey impossible-differential attack on up to 23 (out of 36) rounds of SKINNY-64/128 for different tweak sizes. All our attacks can be trivially extended to SKINNY-128/128.

Files

2016-1127.pdf

Files (611.9 kB)

Name Size Download all
md5:ba61917d15d71d9d26e0c226b8fd3777
611.9 kB Preview Download

Additional details

Funding

European Commission
ECRYPT-NET - European Integrated Research Training Network on Advanced Cryptographic Technologies for the Internet of Things and the Cloud 643161