You are looking at a specific version 20140909:171126 of this paper. See the latest version.

Paper 2014/089

Multiple Differential Cryptanalysis of Round-Reduced PRINCE (Full version)

Anne Canteaut and Thomas Fuhr and Henri Gilbert and María Naya-Plasencia and Jean-René Reinhard

Abstract

PRINCE is a lightweight block cipher proposed by Borghoff et al. at Asiacrypt 2012. Due to its originality, novel design and low number of rounds, it has already attracted the attention of a large number of cryptanalysts. Several results on reduced versions have been published to date; the best one is an attack on 8 rounds out of the total number of 12. In this paper we improve this result by two rounds: we provide an attack on 10 rounds of the cipher with a data complexity of $2^{57.94}$ and a time complexity of $2^{60.62}$, corresponding to 118.56 security bits, instead of 126 for the generic attacks. Our attack uses multiple differentials and exploits some properties of PRINCE for recovering the whole key. PRINCE is defined as a member of a family of ciphers, differing by the choice of an Sbox among a distinguished set. We also show that the security offered by all the members of the family is not equivalent, by identifying an Sbox for which our attack can be extended up to 11 rounds with a data complexity of $2^{59.81}$ and a time complexity of $2^{62.43}$.

Note: This article is the full version of the paper to appear in the proceedings of FSE 2014.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
A minor revision of an IACR publication in FSE 2014
Keywords
Differential cryptanalysisPRINCEmultiple differentials
Contact author(s)
Anne Canteaut @ inria fr
History
2014-09-09: revised
2014-02-10: received
See all versions
Short URL
https://ia.cr/2014/089
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.