A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit <a rel="external noopener" href="https://tosc.iacr.org/index.php/ToSC/article/download/7299/6473">the original URL</a>. The file type is <code>application/pdf</code>.
Cryptanalysis of Reduced round SKINNY Block Cipher
<span title="2018-09-04">2018</span>
<i title="IACR Transactions on Symmetric Cryptology">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ctjq6cpl7vg4pncvotyslbx6ve" style="color: black;">IACR Transactions on Symmetric Cryptology</a>
</i>
SKINNY is a family of lightweight tweakable block ciphers designed to have the smallest hardware footprint. In this paper, we present zero-correlation linear approximations and the related-tweakey impossible differential characteristics for different versions of SKINNY .We utilize Mixed Integer Linear Programming (MILP) to search all zero-correlation linear distinguishers for all variants of SKINNY, where the longest distinguisher found reaches 10 rounds. Using a 9-round characteristic, we
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13154/tosc.v2018.i3.124-162">doi:10.13154/tosc.v2018.i3.124-162</a>
<a target="_blank" rel="external noopener" href="https://dblp.org/rec/journals/tosc/SadeghiMB18.html">dblp:journals/tosc/SadeghiMB18</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fhho3h2h7ffarbywnxng7anuhi">fatcat:fhho3h2h7ffarbywnxng7anuhi</a>
</span>
more »
... nt 14 and 18-round zero correlation attacks on SKINNY-64-64 and SKINNY- 64-128, respectively. Also, for SKINNY-n-n and SKINNY-n-2n, we construct 13 and 15-round related-tweakey impossible differential characteristics, respectively. Utilizing these characteristics, we propose 23-round related-tweakey impossible differential cryptanalysis by applying the key recovery attack for SKINNY-n-2n and 19-round attack for SKINNY-n-n. To the best of our knowledge, the presented zero-correlation characteristics in this paper are the first attempt to investigate the security of SKINNY against this attack and the results on the related-tweakey impossible differential attack are the best reported ones.
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200109211544/https://tosc.iacr.org/index.php/ToSC/article/download/7299/6473" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/3f/4c/3f4ccdf9aadcd4974d6c59bada39240b2856629f.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13154/tosc.v2018.i3.124-162">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="unlock alternate icon" style="background-color: #fb971f;"></i>
Publisher / doi.org
</button>
</a>