Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging

8Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Demirci-Selçuk meet-in-the-middle (formula presented) attack is an effective and generic method for analyzing iterative block ciphers. It reaches the best results on attacking AES in the single-key model. In ASIACRYPT 2018, a tool for finding (formula presented) attack automatically based on general constraint programming was put forward, which can not only enumerate (formula presented) distinguishers, but also partly automate the key-recovery process. However, the constraint programming models generated by this tool do not consider the key-bridging technique, which has been shown to be effective in reducing the complexities of many cryptanalytic attacks. In this work, we build a general constraint model for SKINNY-128–384 (the same target as the ASIACRYPT 2018 paper) integrated with the key-bridging technique. As a result, the time complexity of the key-recovery attack on SKINNY-128–384 is significantly reduced from (formula presented).

Cite

CITATION STYLE

APA

Chen, Q., Shi, D., Sun, S., & Hu, L. (2020). Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11999 LNCS, pp. 233–247). Springer. https://doi.org/10.1007/978-3-030-41579-2_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free