In the differential related-key model, we demonstrate 218- and 174-round differentials holding with probability 1. This shows that a strong related-key property can translate to a successful attack in the non-related-key setting. Having extremely low data requirements, these attacks are valid even in RFID-like environments where only a very limited amount of text material may be available to an attacker.
Category / Keywords: secret-key cryptography / cryptanalysis, meet-in-the-middle attacks, block cipher, key schedule, lightweight cipher, key-recovery, RFID Publication Info: An extended version of the paper accepted for SAC 2010 Date: received 18 Oct 2010, last revised 14 Feb 2011 Contact author: and bogdanov at googlemail com,christian rechberger@groestl info Available format(s): PDF | BibTeX Citation Note: Fixed typos and extended acknowledgements. Version: 20110214:100301 (All versions of this report) Short URL: ia.cr/2010/532 Discussion forum: Show discussion | Start new discussion