Biclique attack of block cipher SKINNY. (English) Zbl 1372.94448

Chen, Kefei (ed.) et al., Information security and cryptology. 12th international conference, Inscrypt 2016, Beijing, China, November 4–6, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-54704-6/pbk; 978-3-319-54705-3/ebook). Lecture Notes in Computer Science 10143, 3-17 (2017).
Summary: SKINNY is a lightweight tweakable block cipher, which was proposed at CRYPTO 2016 [C. Beierle et al., Lect. Notes Comput. Sci. 9815, 123–153 (2016; Zbl 1372.94412)]. This paper presents an optimized brute force attack on full SKINNY using biclique attack with partial matching and precomputation. The results show that full round SKINNY64/64 is not secure against balanced biclique attack, the data complexity is \(2^{48}\), and the time complexity is \(2^{62.92}\). That is a very tiny advantage against brute force attack. Furthermore, an unbalanced biclique attack is considered, which improves the time complexity to \(2^{62.82}\). Moreover, in order to be immune to biclique attack, the round of SKINNY64/64 needs to be increased by 4 rounds to 36 rounds. Other versions of SKINNY do not have full round biclique attack owing to more encryption rounds.
For the entire collection see [Zbl 1358.94004].


94A60 Cryptography


Zbl 1372.94412
Full Text: DOI


[1] Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007). doi: 10.1007/978-3-540-74735-2_31 · Zbl 1142.94334
[2] De Cannière, C., Dunkelman, O., Knežević, M.: KATAN and KTANTAN a family of small and efficient hardware-oriented block ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 272–288. Springer, Heidelberg (2009) · Zbl 1290.94060
[3] Wu, W., Zhang, L.: LBlock: a lightweight block cipher. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 327–344. Springer, Heidelberg (2011). doi: 10.1007/978-3-642-21554-4_19 · Zbl 1250.94047
[4] Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK block ciphers on AVR 8-bit microcontrollers. In: Eisenbarth, T., Öztürk, E. (eds.) LightSec 2014. LNCS, vol. 8898, pp. 3–20. Springer, Cham (2015). doi: 10.1007/978-3-319-16363-5_1 · Zbl 1382.94059
[5] Beierle, C., et al.: The SKINNY family of block ciphers and its low-latency variant MANTIS. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016. LNCS, vol. 9815, pp. 123–153. Springer, Heidelberg (2016). doi: 10.1007/978-3-662-53008-5_5 · Zbl 1372.94412
[6] Diffie, W., Hellman, M.E.: Special feature exhaustive cryptanalysis of the NBS data encryption standard. Computer 10(6), 74–84 (1977) · Zbl 05332334
[7] Bogdanov, A., Khovratovich, D., Rechberger, C.: Biclique cryptanalysis of the full AES. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 344–371. Springer, Heidelberg (2011). doi: 10.1007/978-3-642-25385-0_19 · Zbl 1227.94032
[8] Jean, J., Nikolić, I., Peyrin, T.: Tweaks and keys for block ciphers: the TWEAKEY framework. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8874, pp. 274–288. Springer, Heidelberg (2014). doi: 10.1007/978-3-662-45608-8_15 · Zbl 1317.94113
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.