Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64

Orr Dunkelman, Senyang Huang, Eran Lambooij, Stav Perle

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

SKINNY is a lightweight tweakable block cipher which received a great deal of cryptanalytic attention following its elegant structure and efficiency. Inspired by the SKINNY competitions, multiple attacks on it were reported in different settings (e.g. single vs. related-tweakey) using different techniques (impossible differentials, meet-in-the-middle, etc.). In this paper we revisit some of these attacks, identify issues with several of them, and offer a series of improved attacks which were experimentally verified. Our best attack can attack up to 18 rounds using$$2^{60}$$ chosen ciphertexts data,$$2^{116}$$ time, and$$2^{112}$$ memory.

Original languageEnglish
Title of host publicationCyber Security Cryptography and Machine Learning - 4th International Symposium, CSCML 2020, Proceedings
EditorsShlomi Dolev, Gera Weiss, Vladimir Kolesnikov, Sachin Lodha
PublisherSpringer
Pages1-17
Number of pages17
ISBN (Print)9783030497842
DOIs
StatePublished - 2020
Event4th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2020 - Beersheba, Israel
Duration: 2 Jul 20203 Jul 2020

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume12161 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2020
Country/TerritoryIsrael
CityBeersheba
Period2/07/203/07/20

Bibliographical note

Publisher Copyright:
© 2020, Springer Nature Switzerland AG.

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64'. Together they form a unique fingerprint.

Cite this