Paper 2011/140
Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64
Martin Ågren
Abstract
The hardware-attractive block cipher family KTANTAN was studied by Bogdanov and Rechberger who identified flaws in the key schedule and gave a meet-in-the-middle attack. We revisit their result before investigating how to exploit the weakest key bits. We then develop several related-key attacks, e.g., one on KTANTAN32 which finds 28 key bits in time equivalent to
Note: Use Type 1 fonts for better readability.
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- cryptanalysisrelated keyblock cipherkey schedulelightweight cipherkey-recovery
- Contact author(s)
- martin agren @ eit lth se
- History
- 2011-09-30: last of 3 revisions
- 2011-03-22: received
- See all versions
- Short URL
- https://ia.cr/2011/140
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2011/140, author = {Martin Ågren}, title = {Some Instant- and Practical-Time Related-Key Attacks on {KTANTAN32}/48/64}, howpublished = {Cryptology {ePrint} Archive, Paper 2011/140}, year = {2011}, url = {https://eprint.iacr.org/2011/140} }