Differential cryptanalysis of 18-round PRIDE

2Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The rapid growth of the Internet of Things together with the increasing popularity of connected objects have created a need for secure, efficient and lightweight ciphers. Among the multitude of candidates, the block cipher PRIDE is, to this day, one of the most efficient solutions for 8-bit micro-controllers. In this paper, we provide new insights and a better understanding of differential attacks of PRIDE. First, we show that two previous attacks are incorrect, and describe (new and old) properties of the cipher that make such attacks intricate. Based on this understanding, we show how to properly mount a differential attack. Our proposal is the first single key differential attack that reaches 18 rounds out of 20. It requires 2 61 chosen plaintexts and recovers the 128-bit key with a final time complexity of 2 63.3 encryptions, while requiring a memory of about 2 35 blocks of 64 bits.

Cite

CITATION STYLE

APA

Lallemand, V., & Rasoolzadeh, S. (2017). Differential cryptanalysis of 18-round PRIDE. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10698 LNCS, pp. 126–146). Springer Verlag. https://doi.org/10.1007/978-3-319-71667-1_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free