Welcome to the resource topic for 2016/132
Title:
Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts
Authors: Shahram Rasoolzadeh, Håvard Raddum
Abstract:In this paper we focus on the PRINCE block cipher reduced to 6 rounds, with two known plaintext/ciphertext pairs. We develop two attacks on 6-round PRINCE based on accelerated exhaustive search, one with negligible memory usage and one having moderate memory requirements. The time complexities for the two attacks are 2^{96.78} and 2^{88.85}, respectively. The memory consumption of the second attack is less than 200MB and so is not a restricting factor in a real-world setting.
ePrint: https://eprint.iacr.org/2016/132
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .