First multidimensional cryptanalysis on reduced-round princecore

0Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper we present the first multidimensional linear attack on PRINCEcore, which uses an identical round-key for each round. Traditional one-dimensional and multidimensional linear cryptanalysis based their theoretical foundation on the independent-key assumption, so that they cannot be evaluated accurately in the case of ciphers with identical round-key. In this paper we propose a new classification technique to overcome this obstacle. In our new technique, we classify the linear trails into different subsets indexed by the XOR sum of their trail masks, deal with their correlations in each subset, and get the accurate capacity for our target linear approximation. By this technique, we build an 8-round multidimensional linear distinguisher with capacity of 2-57.99, and exhibit a key-recovery attack on 9 out of 12 round of PRINCEcore. This attack requires a data complexity of 263.84known plaintexts and time complexity of 260encryptions. We also present a key-recovery attack on 10-round PRINCEcore with data complexity of 263.84known plaintexts and time complexity of 275.68encryptions.

Cite

CITATION STYLE

APA

Li, X., Li, B., Wu, W., Yu, X., Hao, R., & Ma, B. (2014). First multidimensional cryptanalysis on reduced-round princecore. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8565, pp. 158–172). Springer Verlag. https://doi.org/10.1007/978-3-319-12160-4_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free