[Resource Topic] 2016/1115: Impossible Differential Cryptanalysis of Reduced-Round SKINNY

Welcome to the resource topic for 2016/1115

Title:
Impossible Differential Cryptanalysis of Reduced-Round SKINNY

Authors: Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef

Abstract:

SKINNY is a new lightweight tweakable block cipher family proposed by Beierle et al. in CRYPTO 2016. SKINNY-n-t is a block cipher with n-bit state and t-bit tweakey (key and tweak). It is designed to compete with the recent NSA SIMON block cipher. In this paper, we present impossible differential attacks against reduced-round versions of all the 6 SKINNY’s variants, namely, SKINNY-n-n, SKINNY-n-2$n$ and SKINNY-n-3$n$ (n=64 or n=128) in the single-tweakey model. More precisely, we present impossible differential attacks against 18, 20 and 22 rounds of SKINNY-n-n, SKINNY-n-2$n$ and SKINNY-n-3$n$ (n=64 or n=128), respectively. These attacks are based on the same 11-round impossible differential distinguisher. To the best of our knowledge, these are the best attacks against these 6 variants of the cipher in the single-tweakey model.

ePrint: https://eprint.iacr.org/2016/1115

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .