Paper 2014/425

Note of Multidimensional MITM Attack on 25-Round TWINE-128

Long Wen, Meiqin Wang, Andrey Bogdanov, and Huaifeng Chen

Abstract

TWINE is a lightweight block cipher proposed in SAC 2012 by Suzaki et al. TWINE operates on 64-bit block and supports 80 or 128-bit key, denoted as TWINE-80 and TWINE-128 respectively. TWINE has attracted some attention since its publication and its security has been analyzed against several cryptanalytic techniques in both single-key and related-key settings. In the single-key setting, the best attack so far is reported by Boztaş et al. at LightSec'13, where a splice-and-cut attack on 21-round TWINE-128 and a multidimensional meet-in-the-middle (MITM) attack on 25-round TWINE-128 are presented. Yet, the evaluation of the time complexity of the multidimensional MITM attack on 25-round TWINE-128 is somehow controversial in the way we understand. We here describe the attack in detail and explains our concerns about the time complexity of the attack. And it turns out that the multidimensional MITM attack on 25-round TWINE-128 may have a time complexity higher than exhaustive search.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
Block CiphersCryptanalysisTWINEMultidimensional MITM Attack
Contact author(s)
longwen6 @ gmail com
History
2014-06-06: received
Short URL
https://ia.cr/2014/425
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/425,
      author = {Long Wen and Meiqin Wang and Andrey Bogdanov and Huaifeng Chen},
      title = {Note of Multidimensional MITM Attack on 25-Round TWINE-128},
      howpublished = {Cryptology ePrint Archive, Paper 2014/425},
      year = {2014},
      note = {\url{https://eprint.iacr.org/2014/425}},
      url = {https://eprint.iacr.org/2014/425}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.