Reflection Cryptanalysis of PRINCE-Like Ciphers

被引:3
|
作者
Soleimany, Hadi [1 ]
Blondeau, Celine [1 ]
Yu, Xiaoli [2 ,3 ]
Wu, Wenling [2 ]
Nyberg, Kaisa [1 ]
Zhang, Huiling [2 ]
Zhang, Lei [2 ]
Wang, Yanfeng [2 ]
机构
[1] Aalto Univ, Sch Sci, Dept Informat & Comp Sci, Espoo, Finland
[2] Chinese Acad Sci, Inst Software, TCA, Beijing, Peoples R China
[3] Chinese Acad Sci, Grad Univ, Beijing, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Block cipher; alpha-reflection property; PRINCE; Statistical attack; Reflection attack; BLOCK CIPHER;
D O I
10.1007/978-3-662-43933-3_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
PRINCE is a low-latency block cipher presented at ASIACRYPT 2012. The cipher was designed with a property called alpha-reflection which reduces the definition of the decryption with a given key to an encryption with a different but related key determined by alpha. In the design document, it was shown that PRINCE is secure against known attacks independently of the value of alpha, and the design criteria for alpha remained open. In this paper, we introduce new generic distinguishers on PRINCE-like ciphers. First, we show that, by folding the cipher in the middle, the number of rounds can be halved due to the alpha-reflection property. Furthermore, we investigate many classes of alpha and find the best differential characteristic for the folded cipher. For such alpha there exist an efficient key-recovery attack on the full 12-round cipher with the data complexity of 2(57.98) known plaintexts and time complexity of 2(72.39) encryptions. With the original value of alpha we can attack a reduced six-round version of PRINCE. As a result of the new cryptanalysis method presented in this paper, new design criteria concerning the selection of the value of alpha for PRINCE-like ciphers are obtained.
引用
收藏
页码:71 / 91
页数:21
相关论文
共 50 条
  • [21] Reflection ciphers
    Christina Boura
    Anne Canteaut
    Lars R. Knudsen
    Gregor Leander
    Designs, Codes and Cryptography, 2017, 82 : 3 - 25
  • [22] Concatenated automata in cryptanalysis of stream ciphers
    Fuster-Sabater, A.
    Caballero-Gil, P.
    CELLULAR AUTOMATA, PROCEEDINGS, 2006, 4173 : 611 - 616
  • [23] Quantum Differential Cryptanalysis to the Block Ciphers
    Li, Hongwei
    Yang, Li
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 44 - 51
  • [24] CRYPTANALYSIS OF TREE-STRUCTURED CIPHERS
    MILLAN, W
    DAWSON, EP
    OCONNOR, LJ
    ELECTRONICS LETTERS, 1994, 30 (12) : 941 - 942
  • [25] Heuristic cryptanalysis of classical and modern ciphers
    Li, HY
    Samsudin, A
    Belaton, B
    2005 13th IEEE International Conference on Networks Jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings 1 and 2, 2005, : 710 - 715
  • [26] Cryptanalysis of MICKEY family of stream ciphers
    Ding, Lin
    Guan, Jie
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) : 936 - 941
  • [27] Efficient Cryptanalysis of Homophonic Substitution Ciphers
    Dhavare, Amrapali
    Low, Richard M.
    Stamp, Mark
    CRYPTOLOGIA, 2013, 37 (03) : 250 - 281
  • [28] Cryptanalysis of stream ciphers with linear masking
    Coppersmith, D
    Halevi, S
    Jutla, C
    ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 515 - 532
  • [29] A graphical simulator for the cryptanalysis of block ciphers
    Boztas, S
    Rao, A
    Maru, B
    Tran, T
    ITHET 2004: PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY BASED HIGHER EDUCATION AND TRAINING, 2004, : 151 - 155
  • [30] Cryptanalysis of WG Family of Stream Ciphers
    Ding, Lin
    Jin, Chenhui
    Guan, Jie
    Zhang, Shaowu
    Cui, Ting
    Han, Dong
    Zhao, Wei
    COMPUTER JOURNAL, 2015, 58 (10): : 2677 - 2685