z-logo
open-access-imgOpen Access
Practical attacks on the round‐reduced PRINCE
Author(s) -
Morawiecki Paweł
Publication year - 2017
Publication title -
iet information security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 34
eISSN - 1751-8717
pISSN - 1751-8709
DOI - 10.1049/iet-ifs.2015.0432
Subject(s) - higher order differential cryptanalysis , differential cryptanalysis , boomerang attack , cipher , linear cryptanalysis , impossible differential cryptanalysis , computer science , cryptanalysis , computer security , block cipher , encryption , cryptography
The PRINCE cipher is the result of a cooperation between the Technical University of Denmark, NXP Semiconductors and the Ruhr University Bochum. The cipher was designed to reach an extremely low‐latency encryption and instant response time. PRINCE has already gained a lot of attention from the academic community, however, most of the attacks are theoretical, usually with very high time or data complexity. This work helps to fill the gap in more practically oriented attacks, with more realistic scenarios and complexities. New attacks are presented, up to seven rounds, relying on integral and higher‐order differential cryptanalysis.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here