首页> 外文会议>Applied cryptography and network security >Related-Key Impossible-Differential Attack on Reduced-Round Skinny
【24h】

Related-Key Impossible-Differential Attack on Reduced-Round Skinny

机译:缩小圆角瘦身的相关关键不可能差分攻击

获取原文
获取原文并翻译 | 示例

摘要

At CRYPTO'16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with the NSA designs SIMON and SPECK. SKINNY can be implemented efficiently in both soft- and hardware and supports block sizes of 64 and 128 bits as well as tweakey sizes of 64, 128, 192 and 128, 256, 384 bits respectively. This paper presents a related-tweakey impossible-differential attack on up to 23 (out of 36) rounds of SKINNY-64/128 for different tweak sizes. All our attacks can be trivially extended to SKINNY-128/128.
机译:在CRYPTO'16,Beierle等人。提出了SKINNY,这是一种旨在与NSA设计SIMON和SPECK竞争的轻量可调节分组密码家族。 SKINNY可以在软件和硬件上高效实现,并且分别支持64位和128位的块大小以及64位,128位,192位和128、256位,384位的twekey大小。本文针对不同的调整大小,针对SKINNY-64 / 128的多达23轮(共36轮)提出了相关的twekey不可能的差分攻击。我们所有的攻击都可以简单地扩展到SKINNY-128 / 128。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号