Paper 2020/1072

Cryptanalysis of the permutation based algorithm SpoC

Liliya Kraleva, Raluca Posteuca, and Vincent Rijmen

Abstract

In this paper we present an analysis of the SpoC cipher, a second round candidate of the NIST Lightweight Crypto Standardization process. First we present a differential analysis on the sLiSCP-light permutation, a core element of SpoC. Then we propose a series of attacks on both versions of SpoC, namely round-reduced differential tag forgery and message recovery attacks, as well as a time-memory trade-off key-recovery attack on the full round version of Spoc-64. Finally, we present an observation regarding the constants used in the sLiSCP-light permutation. To the best of our knowledge, this paper represents the first third-party analysis on both SpoC cipher and the sLiSCP-light permutation.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Contact author(s)
lkraleva @ esat kuleuven be
raluca posteuca @ esat kuleuven be
History
2020-09-09: received
Short URL
https://ia.cr/2020/1072
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2020/1072,
      author = {Liliya Kraleva and Raluca Posteuca and Vincent Rijmen},
      title = {Cryptanalysis of the permutation based algorithm SpoC},
      howpublished = {Cryptology ePrint Archive, Paper 2020/1072},
      year = {2020},
      note = {\url{https://eprint.iacr.org/2020/1072}},
      url = {https://eprint.iacr.org/2020/1072}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.