In this paper, we devise new cryptanalytic time-memory-data tradeoff attacks on FX-constructions. While our attacks do not contradict the security proof of PRINCE and PRIDE, nor pose an immediate threat to their users, some specific choices of tradeoff parameters demonstrate that the security margin of the ciphers against practical attacks is smaller than expected. Our techniques combine a special form of time-memory-data tradeoffs, typically applied to stream ciphers, with recent analysis of FX-constructions by Fouque, Joux and Mavromati.
Category / Keywords: secret-key cryptography / Cryptanalysis, block cipher, time-memory-data tradeoff, FX-construction, DESX, PRINCE, PRIDE. Original Publication (with minor differences): IACR-EUROCRYPT-2015 Date: received 23 Aug 2014, last revised 18 Feb 2015 Contact author: dinur at di ens fr Available format(s): PDF | BibTeX Citation Version: 20150218:125231 (All versions of this report) Short URL: ia.cr/2014/656 Discussion forum: Show discussion | Start new discussion