Sciweavers

Share
IACR
2016

Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts

5 years 6 months ago
Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts
In this paper we focus on the PRINCE block cipher reduced to 6 rounds, with two known plaintext/ciphertext pairs. We develop two attacks on 6-round PRINCE based on accelerated exhaustive search, one with negligible memory usage and one having moderate memory requirements. The time complexities for the two attacks are 296.78 and 288.85 , respectively. The memory consumption of the second attack is less than 200MB and so is not a restricting factor in a real-world setting.
Shahram Rasoolzadeh, Håvard Raddum
Added 03 Apr 2016
Updated 03 Apr 2016
Type Journal
Year 2016
Where IACR
Authors Shahram Rasoolzadeh, Håvard Raddum
Comments (0)
books