Paper 2014/525

Differential Analysis on Block Cipher PRIDE

Jingyuan Zhao, Xiaoyun Wang, Meiqin Wang, and Xiaoyang Dong

Abstract

The lightweight block cipher PRIDE designed by Albrecht et al., appears in CRYPTO 2014. The designers claim that their method of constructing linear layer is good both in security and efficiency. In this paper, we find 16 different 2-round iterative characteristics utilizing the weaknesses of S-box and linear layer, construct several 15-round differentials. Based on one of the differentials, we launch differential attack on 18-round PRIDE. The data, time and memory complexity are $2^{60}$, $2^{66}$ and $2^{64}$, respectively.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
Differential AnalysisBlock CipherPRIDE
Contact author(s)
jingyuanzhao @ mail sdu edu cn
History
2014-07-07: received
Short URL
https://ia.cr/2014/525
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/525,
      author = {Jingyuan Zhao and Xiaoyun Wang and Meiqin Wang and Xiaoyang Dong},
      title = {Differential Analysis on Block Cipher PRIDE},
      howpublished = {Cryptology ePrint Archive, Paper 2014/525},
      year = {2014},
      note = {\url{https://eprint.iacr.org/2014/525}},
      url = {https://eprint.iacr.org/2014/525}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.