2011 | OriginalPaper | Buchkapitel
Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations
verfasst von : Mohamed Ahmed Abdelraheem, Gregor Leander, Erik Zenner
Erschienen in: Fast Software Encryption
Verlag: Springer Berlin Heidelberg
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
At CHES 2010, the new block cipher
PRINTcipher
was presented. In addition to using an xor round key as is common practice for round-based block ciphers,
PRINTcipher
also uses key-dependent permutations. While this seems to make differential cryptanalysis difficult due to the unknown bit permutations, we show in this paper that this is not the case. We present two differential attacks that successfully break about half of the rounds of
PRINTcipher
, thereby giving the first cryptanalytic result on the cipher.
In addition, one of the attacks is of independent interest, since it uses a mechanism to compute roots of permutations. If an attacker knows the many-round permutation
π
r
, the algorithm can be used to compute the underlying single-round permutation
π
. This technique is thus relevant for all iterative ciphers that deploy key-dependent permutations. In the case of
PRINTcipher
, it can be used to show that the linear layer adds little to the security against differential attacks.