You are looking at a specific version 20140623:130349 of this paper. See the latest version.

Paper 2014/485

An Improved Truncated Differential Cryptanalysis of KLEIN

Shahram Rasoolzadeh, Zahra Ahmadian, Mahmood Salmasizadeh, and Mohammad Reza Aref

Abstract

KLEIN is a family of lightweight block ciphers which proposed at RFIDSec 2011 by Gong et al. It has a 64-bit state and 64, 80 or 96-bit key size which introduce its version. It uses a 4-bit S-Box combined with Rijndael's byte-oriented MixColumn transformation for each round. This approach allows compact implementations of KLEIN in both low-end software and hardware. Its simplicity attracts the attention of cryptanalysts, and several security analyses have been published. The best of these was represented by Lallemand et al. which was a truncated differential attack. They could attack up to 12, 13 and 14 rounds out of total number of 12, 16 and 20 rounds for KLEIN-64, -80 and -96, respectively. In this paper, by finding new truncated differential paths and improving key recovery method we present two new truncated differential attacks on KLEIN, which recover the full secret key with better time and data complexities for 12, 14 and 15 rounds for KLEIN-64, -80 and -96, respectively.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
KLEINLightweight Block CipherTruncated Differential Cryptanlysis
Contact author(s)
rasoolzadeh shahram @ gmail com
History
2017-11-07: last of 5 revisions
2014-06-23: received
See all versions
Short URL
https://ia.cr/2014/485
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.