[Resource Topic] 2016/132: Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts

Welcome to the resource topic for 2016/132

Title:
Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts

Authors: Shahram Rasoolzadeh, Håvard Raddum

Abstract:

In this paper we focus on the PRINCE block cipher reduced to 6 rounds, with two known plaintext/ciphertext pairs. We develop two attacks on 6-round PRINCE based on accelerated exhaustive search, one with negligible memory usage and one having moderate memory requirements. The time complexities for the two attacks are 2^{96.78} and 2^{88.85}, respectively. The memory consumption of the second attack is less than 200MB and so is not a restricting factor in a real-world setting.

ePrint: https://eprint.iacr.org/2016/132

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .