[Resource Topic] 2012/085: Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery

Welcome to the resource topic for 2012/085

Title:
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery

Authors: Stanislav Bulygin, Michael Walter

Abstract:

In this paper we investigate the invariant property of PRINTcipher first discovered by Leander et al. in their CRYPTO 2011 paper. We provide a thorough study and show that there exist 64 families of weak keys for PRINTcipher–48 and many more for PRINTcipher–96. Moreover, we show that searching the weak key space may be substantially sped up by splitting the search into two consecutive steps. We show that for many classes of weak keys key recovery can be done in a matter of minutes in the chosen/known plaintext scenario. In fact, at least 2^{45} weak keys can be recovered in less than 20 minutes per key on a single PC using only a few chosen and one known plaintext(s). We provide detailed treatment of the methods and put them in a more general context that opens new interesting directions of research for PRESENT-like ciphers.

ePrint: https://eprint.iacr.org/2012/085

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .