TY - GEN
T1 - Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64
AU - Dunkelman, Orr
AU - Huang, Senyang
AU - Lambooij, Eran
AU - Perle, Stav
PY - 2020
Y1 - 2020
N2 - SKINNY is a lightweight tweakable block cipher which received a great deal of cryptanalytic attention following its elegant structure and efficiency. Inspired by the SKINNY competitions, multiple attacks on it were reported in different settings (e.g. single vs. related-tweakey) using different techniques (impossible differentials, meet-in-the-middle, etc.). In this paper we revisit some of these attacks, identify issues with several of them, and offer a series of improved attacks which were experimentally verified. Our best attack can attack up to 18 rounds using 260 chosen ciphertexts data, 2116 time, and 2112 memory.
AB - SKINNY is a lightweight tweakable block cipher which received a great deal of cryptanalytic attention following its elegant structure and efficiency. Inspired by the SKINNY competitions, multiple attacks on it were reported in different settings (e.g. single vs. related-tweakey) using different techniques (impossible differentials, meet-in-the-middle, etc.). In this paper we revisit some of these attacks, identify issues with several of them, and offer a series of improved attacks which were experimentally verified. Our best attack can attack up to 18 rounds using 260 chosen ciphertexts data, 2116 time, and 2112 memory.
U2 - 10.1007/978-3-030-49785-9_1
DO - 10.1007/978-3-030-49785-9_1
M3 - Paper in conference proceeding
SN - 978-3-030-49784-2
T3 - Lecture Notes in Computer Science
SP - 1
EP - 17
BT - Cyber Security Cryptography and Machine Learning
PB - Springer
T2 - Fourth International Symposium, CSCML 2020
Y2 - 2 July 2020 through 3 July 2020
ER -