You are looking at a specific version 20190414:031847 of this paper. See the latest version.

Paper 2019/374

Probability 1 Iterated Differential in the SNEIK Permutation

Léo Perrin

Abstract

SNEIK is a permutation at the core of a submission to the NIST lightweight cryptography project. In this note, we exhibit an iterated probability 1 differential in this permutation. However, it is still unclear if this differential can be used to construct attacks against the permutation in a mode, e.g., against the hash function SNEIKHA. We also suggest a simple fix: adding a 32-bit rotation in one tap prevents this issue.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
SNEIKNIST lightweight cryptography projectDifferential CryptanalysisARXpermutation
Contact author(s)
leo perrin @ inria fr
History
2019-04-14: received
Short URL
https://ia.cr/2019/374
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.