http://iet.metastore.ingenta.com
1887

Practical attacks on the round-reduced PRINCE

Practical attacks on the round-reduced PRINCE

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The PRINCE cipher is the result of a cooperation between the Technical University of Denmark, NXP Semiconductors and the Ruhr University Bochum. The cipher was designed to reach an extremely low-latency encryption and instant response time. PRINCE has already gained a lot of attention from the academic community, however, most of the attacks are theoretical, usually with very high time or data complexity. This work helps to fill the gap in more practically oriented attacks, with more realistic scenarios and complexities. New attacks are presented, up to seven rounds, relying on integral and higher-order differential cryptanalysis.

References

    1. 1)
      • 1. Daemen, J., Rijmen, V.: ‘The design of rijndael: AES - the advanced encryption standard’ (Information Security and Cryptography, Springer, 2002).
    2. 2)
      • 2. Borghoff, J., Canteaut, A., Güneysu, T., et al: ‘PRINCE – A low-latency block cipher for pervasive computing applications - extended abstract’. Advances in Cryptology – ASIACRYPT 2012 – 18th Int. Conf. on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012, Proceedings pp. 208225).
    3. 3)
      • 3. Canteaut, A., Fuhr, T., Gilbert, H., et al: ‘Multiple differential cryptanalysis of round-reduced PRINCE’. Fast Software Encryption – 21st Int. Workshop, FSE 2014, London, UK, 3–5 March 2014, Revised Selected Papers, pp. 591610.
    4. 4)
      • 4. Jean, J., Nikolic, I., Peyrin, T., et al: ‘Security analysis of PRINCE’. Fast Software Encryption – 20th Int. Workshop, FSE 2013, Singapore, 11–13 March 2013, Revised Selected Papers, pp. 92111.
    5. 5)
      • 5. Li, L., Jia, K., Wang, X.: ‘Improved meet-in-the-middle attacks on AES-192 and PRINCE’, Cryptology ePrint Archive, Report 2013/573, 2013.
    6. 6)
      • 6. Soleimany, H., Blondeau, C., Yu, X., et al: ‘Reflection cryptanalysis of PRINCE-like ciphers’. Fast Software Encryption – 20th Int. Workshop, FSE 2013, Singapore, 11–13 March 2013, Revised Selected Papers, pp. 7191.
    7. 7)
      • 7. PRINCE Challenge. Available at https://www.emsec.rub.de/research/research_startseite/prince-challenge.
    8. 8)
      • 8. Derbez, P., Pérrin, L.: ‘Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE’. Fast Software Encryption Conf., 2015.
    9. 9)
      • 9. Posteuca, R., Negara, G.: ‘Integral cryptanalysis of round-reduced PRINCE cipher’. Proc. of the Romanian Academy, Series A, Special Issue, 2015, Volume16,.
    10. 10)
      • 10. Daemen, J., Knudsen, L.R., Rijmen, V.: ‘The block cipher square’. FSE., 1997, pp. 149165.
    11. 11)
      • 11. Z'aba, M.R., Raddum, H., Henricksen, M., et al: ‘Bit-pattern based integral attack’. FSE., Springer, 2008, (LNCS, 5086), pp. 363381.
    12. 12)
      • 12. Lai, X.: ‘Higher order derivatives and differential cryptanalysis’. In: Blahut, R., Costello Daniel, J.J., Maurer, U., Mittelholzer, T. (eds.) ‘Communications and Cryptography, The Springer International Series in Engineering and Computer Science’ (Springer, US, 1994), vol. 276, pp. 227233.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2015.0432
Loading

Related content

content/journals/10.1049/iet-ifs.2015.0432
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address