z-logo
open-access-imgOpen Access
Practical Key-Recovery Attack on MANTIS5
Author(s) -
Christoph Dobraunig,
Maria Eichlseder,
Daniel Kales,
Florian Mendel
Publication year - 2017
Publication title -
iacr transaction on symmetric cryptology
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.715
H-Index - 10
ISSN - 2519-173X
DOI - 10.46586/tosc.v2016.i2.248-260
Subject(s) - computer science , block cipher , slide attack , computer security , key schedule , boomerang attack , key (lock) , block (permutation group theory) , differential cryptanalysis , theoretical computer science , cryptography , mathematics , geometry
MANTIS is a lightweight tweakable block cipher published at CRYPTO 2016. In addition to the full 14-round version, MANTIS7, the designers also propose an aggressive 10-round version, MANTIS5. The security claim for MANTIS5 is resistance against “practical attacks”, defined as related-tweak attacks with data complexity 2d less than 230 chosen plaintexts (or 240 known plaintexts), and computational complexity at most 2126−d. We present a key-recovery attack against MANTIS5 with 228 chosen plaintexts and a computational complexity of about 238 block cipher calls, which violates this claim. Our attack is based on a family of differential characteristics and exploits several properties of the lightweight round function and tweakey schedule. To verify the validity of the attack, we also provide a practical implementation which recovers the full key in about 1 core hour using 230 chosen plaintexts.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here