Paper 2016/1127

Related-Key Impossible-Differential Attack on Reduced-Round SKINNY

Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, and Gaoli Wang


At CRYPTO'16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with SIMON. SKINNY can be implemented efficiently in both soft- and hardware, possesses a Substitution- Permutation-Network structure, and supports block sizes of 64 and 128 bits as well as key and tweak sizes of 64, 128, 192, and 256 bits. This paper outlines a related-tweakey impossible-differential attack on 21 rounds of SKINNY-64/128 and two attacks on 22 and 23 rounds of SKINNY-64/128 under the assumption that 48 bits of the tweakey are public.

Note: extend results to a 23 round attack

Available format(s)
Publication info
Symmetric cryptographycryptanalysistweakable block cipherimpossible differentialslightweight cryptography
Contact author(s)
ralph ankele 2015 @ live rhul ac uk
2017-01-13: last of 3 revisions
2016-12-02: received
See all versions
Short URL
Creative Commons Attribution


      author = {Ralph Ankele and Subhadeep Banik and Avik Chakraborti and Eik List and Florian Mendel and Siang Meng Sim and Gaoli Wang},
      title = {Related-Key Impossible-Differential Attack on Reduced-Round SKINNY},
      howpublished = {Cryptology ePrint Archive, Paper 2016/1127},
      year = {2016},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.