2014
DOI: 10.1007/978-3-662-43933-3_6
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of PRINCE

Abstract: Abstract. In this article, we provide the first third-party security analysis of the PRINCE lightweight block cipher, and the underlying PRINCEcore. First, while no claim was made by the authors regarding related-key attacks, we show that one can attack the full cipher with only a single pair of related keys, and then reuse the same idea to derive an attack in the single-key model for the full PRINCEcore for several instances of the α parameter (yet not the one randomly chosen by the designers). We also show h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
55
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 46 publications
(55 citation statements)
references
References 11 publications
0
55
0
Order By: Relevance
“…We have also shown how to directly tweak the AES-128 block cipher, with the very simple and extremely efficient Kiasu-BC tweakable block cipher. Our three proposals Deoxys-BC, Joltik-BC and Kiasu-BC are the base of the three CAESAR authenticated encryption competition candidates Deoxys [31], Joltik [32] and Kiasu [33], respectively.…”
Section: Resultsmentioning
confidence: 99%
“…We have also shown how to directly tweak the AES-128 block cipher, with the very simple and extremely efficient Kiasu-BC tweakable block cipher. Our three proposals Deoxys-BC, Joltik-BC and Kiasu-BC are the base of the three CAESAR authenticated encryption competition candidates Deoxys [31], Joltik [32] and Kiasu [33], respectively.…”
Section: Resultsmentioning
confidence: 99%
“…Though being very recent, it has already waked the interest of many cryptanalysts [37,26,1]. The best known attacks so far on the proposed cipher, including the security analysis performed by the authors, reach 6 rounds.…”
Section: Application To Princementioning
confidence: 99%
“…In particular, MITM with bicliques (without guessing the whole key) is said to reach at most 6 rounds (out of 12). In [26], a reduction of the security by one bit is presented, and in [1] an accelerated exhaustive search using bicliques is presented. Here, we describe how to build sieve-in-the-middle attacks on 8 rounds with data complexity 1 (or 2 if we want to the whole key instead of a set of candidates).…”
Section: Application To Princementioning
confidence: 99%
“…Some have no key schedule, and just use master keys directly in each round [9,14]. These key schedules are succinct but responsible for many attacks, especially related-key attacks [18,13], MITM attacks and their variants [19,12,5], and special attacks such as the invariant subspace attack on PRINTcipher [15].…”
Section: Introductionmentioning
confidence: 99%