Some instant- and practical-time related-key attacks on KTANTAN32/48/64

Martin Ågren

Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

187 Downloads (Pure)

Abstract

The hardware-attractive block cipher family KTANTAN was studied by Bogdanov and Rechberger who identified flaws in the key schedule and gave a meet-in-the-middle attack. We revisit their result before investigating how to exploit the weakest key bits. We then develop several related-key attacks, e.g., one on KTANTAN32 which finds 28 key bits in time equivalent to $2^{3.0}$ calls to the full KTANTAN32 encryption. The main result is a related-key attack requiring $2^{28.44}$ time (half a minute on a current CPU) to recover the full 80-bit key. For KTANTAN48, we find three key bits in the time of one encryption, and give several other attacks, including full key recovery. For KTANTAN64, the attacks are only slightly more expensive, requiring $2^{10.71}$ time to find 38 key bits, and $2^{32.28}$ for the entire key. For all attacks, the requirements on related-key material are modest as in the forward and backward directions, we only need to flip a single key bit. All attacks succeed with probability one. Our attacks directly contradict the designers' claims. We discuss why this is, and what can be learnt from this.
Original languageEnglish
Title of host publicationSelected Areas in Cryptography
Subtitle of host publication18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers
PublisherSpringer
Pages213-229
ISBN (Electronic)978-3-642-28496-0
ISBN (Print)978-3-642-28495-3
DOIs
Publication statusPublished - 2012
EventSelected Areas in Cryptography - Toronto, Canada
Duration: 2011 Aug 102011 Aug 12

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume7118
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceSelected Areas in Cryptography
Country/TerritoryCanada
CityToronto
Period2011/08/102011/08/12

Subject classification (UKÄ)

  • Electrical Engineering, Electronic Engineering, Information Engineering

Free keywords

  • cryptanalysis
  • related key
  • block cipher
  • key schedule
  • lightweight cipher
  • key-recovery

Fingerprint

Dive into the research topics of 'Some instant- and practical-time related-key attacks on KTANTAN32/48/64'. Together they form a unique fingerprint.

Cite this