Security Analysis of PRINCE - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu
Communication Dans Un Congrès Année : 2013

Security Analysis of PRINCE

Résumé

In this article, we provide the first third-party security analysis of the PRINCE lightweight block cipher, and the underlying PRINCE_core. First, while no claim was made by the authors regarding related-key attacks, we show that one can attack the full cipher with only a single pair of related keys, and then reuse the same idea to derive an attack in the single-key model for the full PRINCE_core for several instances of the α parameter (yet not the one randomly chosen by the designers). We also show how to exploit the structural linear relations that exist for PRINCE in order to obtain a key recovery attack that slightly breaks the security claims for the full cipher. We analyze the application of integral attacks to get the best known key-recovery attack on a reduced version of the PRINCE cipher. Finally, we provide time-memory-data tradeoffs, that require only known plaintext-ciphertext data, and that can be applied to full PRINCE.
Fichier principal
Vignette du fichier
fse2013.pdf (415.76 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-00870448 , version 1 (07-10-2013)

Identifiants

  • HAL Id : hal-00870448 , version 1

Citer

Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu. Security Analysis of PRINCE. FSE 2013, Mar 2013, Singapore, Singapore. ⟨hal-00870448⟩
245 Consultations
500 Téléchargements

Partager

Gmail Facebook X LinkedIn More