In this paper, we present new attacks on round-reduced PRINCE including the ones which won the challenge in the 6 and 8-round categories --- the highest for which winners were identified. Our first attacks rely on a meet-in-the-middle approach and break up to 10 rounds of the cipher. We also describe heuristic methods we used to find practical SAT-based and differential attacks.
Finally, we also present an analysis of the cycle structure of the internal rounds of PRINCE leading both to a low complexity distinguisher for 4-round PRINCE-core and an alternative representation of the cipher valid in particular contexts and which highlights, in this cases, a poor diffusion.
Category / Keywords: secret-key cryptography / PRINCE, practical attacks, meet-in-the-middle, SAT-solver, statistical analysis Original Publication (in the same form): IACR-FSE-2015 Date: received 13 Mar 2015, last revised 19 Mar 2015 Contact author: patrick derbez at uni lu Available format(s): PDF | BibTeX Citation Note: IACR copyright agreement added Version: 20150319:150632 (All versions of this report) Short URL: ia.cr/2015/239 Discussion forum: Show discussion | Start new discussion