Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64

Dunkelman, Orr ; Huang, Senyang LU ; Lambooij, Eran and Perle, Stav (2020) Fourth International Symposium, CSCML 2020 In Lecture Notes in Computer Science 12161. p.1-17
Abstract
SKINNY is a lightweight tweakable block cipher which received a great deal of cryptanalytic attention following its elegant structure and efficiency. Inspired by the SKINNY competitions, multiple attacks on it were reported in different settings (e.g. single vs. related-tweakey) using different techniques (impossible differentials, meet-in-the-middle, etc.). In this paper we revisit some of these attacks, identify issues with several of them, and offer a series of improved attacks which were experimentally verified. Our best attack can attack up to 18 rounds using 260 chosen ciphertexts data, 2116 time, and 2112 memory.
Please use this url to cite or link to this publication:
author
; ; and
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
host publication
Cyber Security Cryptography and Machine Learning : Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings - Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings
series title
Lecture Notes in Computer Science
volume
12161
pages
1 - 17
publisher
Springer
conference name
Fourth International Symposium, CSCML 2020
conference location
Be'er Sheva, Israel
conference dates
2020-07-02 - 2020-07-03
external identifiers
  • scopus:85087759414
ISSN
1611-3349
0302-9743
ISBN
978-3-030-49784-2
978-3-030-49785-9
DOI
10.1007/978-3-030-49785-9_1
language
English
LU publication?
no
id
8782454b-99eb-41c7-b8e4-0e8c2b1cdc3d
date added to LUP
2021-12-04 12:34:24
date last changed
2024-03-23 15:21:01
@inproceedings{8782454b-99eb-41c7-b8e4-0e8c2b1cdc3d,
  abstract     = {{SKINNY is a lightweight tweakable block cipher which received a great deal of cryptanalytic attention following its elegant structure and efficiency. Inspired by the SKINNY competitions, multiple attacks on it were reported in different settings (e.g. single vs. related-tweakey) using different techniques (impossible differentials, meet-in-the-middle, etc.). In this paper we revisit some of these attacks, identify issues with several of them, and offer a series of improved attacks which were experimentally verified. Our best attack can attack up to 18 rounds using   2<sup>60</sup>  chosen ciphertexts data,   2<sup>116</sup>  time, and   2<sup>112</sup>  memory.}},
  author       = {{Dunkelman, Orr and Huang, Senyang and Lambooij, Eran and Perle, Stav}},
  booktitle    = {{Cyber Security Cryptography and Machine Learning : Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings}},
  isbn         = {{978-3-030-49784-2}},
  issn         = {{1611-3349}},
  language     = {{eng}},
  pages        = {{1--17}},
  publisher    = {{Springer}},
  series       = {{Lecture Notes in Computer Science}},
  title        = {{Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64}},
  url          = {{http://dx.doi.org/10.1007/978-3-030-49785-9_1}},
  doi          = {{10.1007/978-3-030-49785-9_1}},
  volume       = {{12161}},
  year         = {{2020}},
}