Advertisement

Impossible Differential Analysis on 8-Round PRINCE

  • Yaoling Ding
  • Keting JiaEmail author
  • An Wang
  • Ying Shi
Conference paper
  • 7 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1143)

Abstract

PRINCE is a lightweight block cipher, which was proposed by Borghoff et al. in Asiacrypt 2012. Various cryptanalytic techniques have been employed to evaluate the security of PRINCE. In 2017, Ding et al. constructed a 4-round impossible differential based on some observations on M′ operation and launched impossible differential attacks on 6- and 7-round PRINCE and the underlying PRINCEcore. In this paper, we explore the differential distribution table (DDT) of the S-box employed in PRINCE and construct a more detailed DDT which contains the input/output values corresponding to each differential. Taking advantage of the table, we compute the subkeys instead of guessing them. With this technique, we extend the impossible differential attacks of PRINCE and PRINCEcore to eight rounds. The corresponding computational and complexities are \( 2^{110.7} \) and \( 2^{62.26} \) encryptions, respectively, which are much less than exhaustive search. And the data complexities are \( 2^{64} \) and \( 2^{60} \) chosen plaintexts, respectively.

Keywords

PRINCE Impossible differential S-box M′ operation 

Notes

Acknowledgements

This work is supported by the National Key Research and Development Program of China (No. 2017YFA0303903), National Cryptography Development Fund (Nos. MMJJ20170121, MMJJ20170201), Zhejiang Province Key R&D Project (No. 2017C01062), National Natural Science Foundation of China (Nos. 61872040, U1836101) and Foundation of Science and Technology on Information Assurance Laboratory (No. KJ-17-009).

References

  1. 1.
    Borghoff, J., Canteaut, A., Güneysu, T., Kavun, E.B., Knezevic, M., Knudsen, L.R., Leander, G., Nikov, V., Paar, C., Rechberger, C. et al.: PRINCE-a low-latency block cipher for pervasive computing applications. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 208–225 (2012)Google Scholar
  2. 2.
    Canteaut, A., Fuhr, T., Gilbert, H., Naya-Plasencia, M., Reinhard, J.R.: Multiple differential cryptanalysis of round-reduced PRINCE. In: International Workshop on Fast Software Encryption, pp. 591–610. Springer, Berlin (2014)Google Scholar
  3. 3.
    Canteaut, A., Naya-Plasencia, M., Vayssiere, B.: Sieve-in-the-middle: Improved MITM attacks. In: Advances in Cryptology-CRYPTO, pp. 222–240. Springer, Berlin (2013)Google Scholar
  4. 4.
    Derbez, P., Perrin, L.: Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE. In: International Workshop on Fast Software Encryption, pp. 190–216. Springer, Berlin (2015)Google Scholar
  5. 5.
    Ding, Y.L., Zhao, J.Y., Li, L.B., Yu, H.B.: Impossible differential analysis on round-reduced prince. J. Inf. Sci. Eng. 33(4) (2017)Google Scholar
  6. 6.
    Grassi, L., Rechberger, C.: Practical low data-complexity subspace-trail cryptanalaysis of round-reduced PRINCE. IACR Cryptol. Eprint Arch. 2016, 964 (2016)zbMATHGoogle Scholar
  7. 7.
    Jia, K., Wang, N.: Impossible differential cryptanalysis of 14-round camellia-192. In: Australasian Conference on Information Security and Privacy, pp. 363–378. Springer, Berlin (2016)Google Scholar
  8. 8.
    Li, L., Jia, K., Wang, X.: Improved meet-in-the-middle attacks on AES-192 and PRINCE. IACR Cryptol. Eprint Arch. 573 (2013)Google Scholar
  9. 9.
    Morawiecki, P.: Practical attacks on the round-reduced PRINCE. IET Inf. Secur. (2016)Google Scholar
  10. 10.
    Posteuca, R., Duta, C.L., Negara, G.: New approaches for round-reduced PRINCE cipher cryptanalysis. In: Proceedings of the Romanian Academy, Series A-Mathmatics Physics Technical Sciences Information Science 16, pp. 253–264 (2015)Google Scholar
  11. 11.
    Posteuca, R., Negara, G.: Integral cryptanalysis of round-reduced PRINCE cipher. Proc. Rom.Ian Acad., Ser. A 16, 265–270 (2015)MathSciNetGoogle Scholar
  12. 12.
    Soleimany, H., Blondeau, C., Yu, X., Wu, W., Nyberg, K., Zhang, H., Zhang, L., Wang, Y.: Reection cryptanalysis of PRINCE-like ciphers. J. Cryptol. 28(3), 718–744 (2015)CrossRefGoogle Scholar
  13. 13.
  14. 14.
    Zhao, G., Sun, B., Li, C., Su, J.: Truncated differential cryptanalysis of PRINCE. Secur. Commun. Netw. 8(16), 2875–2887 (2015)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2021

Authors and Affiliations

  1. 1.School of Computer ScienceBeijing Institute of TechnologyBeijingChina
  2. 2.Department of Computer Science and TechnologyTsinghua UniversityBeijingChina
  3. 3.Key Laboratory of Network Assessment TechnologyCAS Institute of Information Engineering, Chinese Academy of SciencesBeijingChina
  4. 4.State Key Laboratory of Information SecurityInstitute of Information Engineering, Chinese Academy of SciencesBeijingChina

Personalised recommendations