Abstract
The PRINCE is a light-weight block cipher with the 64-bit block size and 128-bit key size. It is characterized by low power-consumption and low latency. PRINCEcore is the PRINCE cipher without key-whiting. For evaluating its security, a statistical testing on linear transformation is performed, and a statistical character matrix is given. By using the “miss-in-the-middle” technique, we construct 5-round zero-correlation linear approximations. Based on the 5-round distinguisher, a 9-round attack on the PRINCEcore is performed. The data complexity is \( 2^{62.9} \) known plaintexts and the time complexity is \( 2^{55.14} \) 9-round encryptions. The testing result shows that the PRINCEcore reduced to 9 rounds is not immune to multidimensional zero-correlation linear analysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007). doi:10.1007/978-3-540-74735-2_31
Wu, W., Zhang, L.: LBlock: a lightweight block cipher. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 327–344. Springer, Heidelberg (2011). doi:10.1007/978-3-642-21554-4_19
Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED block cipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 326–341. Springer, Heidelberg (2011). doi:10.1007/978-3-642-23951-9_22
Cannière, C., Dunkelman, O., Knežević, M.: KATAN and KTANTAN — a family of small and efficient hardware-oriented block ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 272–288. Springer, Heidelberg (2009). doi:10.1007/978-3-642-04138-9_20
Borghoff, J., et al.: prince – a low-latency block cipher for pervasive computing applications. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 208–225. Springer, Heidelberg (2012). doi:10.1007/978-3-642-34961-4_14
Bogdanov, A., Rijmen, V.: Linear hulls with correlation zero and linear cryptanalysis of block ciphers. Des. Codes Crypt. 70(3), 369–383 (2014)
Bogdanov, A., Wang, M.: Zero correlation linear cryptanalysis with reduced data complexity. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol. 7549, pp. 29–48. Springer, Heidelberg (2012). doi:10.1007/978-3-642-34047-5_3
Bogdanov, A., Leander, G., Nyberg, K., Wang, M.: Integral and multidimensional linear distinguishers with correlation zero. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 244–261. Springer, Heidelberg (2012). doi:10.1007/978-3-642-34961-4_16
Wang, Y., Wu, W.: Improved multidimensional zero-correlation linear cryptanalysis and applications to LBlock and TWINE. In: Susilo, W., Mu, Y. (eds.) ACISP 2014. LNCS, vol. 8544, pp. 1–16. Springer, Cham (2014). doi:10.1007/978-3-319-08344-5_1
Wen, L., Wang, M., Bogdanov, A.: Multidimensional zero-correlation linear cryptanalysis of E2. In: Pointcheval, D., Vergnaud, D. (eds.) AFRICACRYPT 2014. LNCS, vol. 8469, pp. 147–164. Springer, Cham (2014). doi:10.1007/978-3-319-06734-6_10
Ma, M., Zhao, Y., Liu, Q., Liu, F.: Multidimensional zero-correlation linear cryptanalysis on SMS4 algorithm. J. Cryptol. Res. 2(5), 458–466 (2015)
Yi, W., Chen, S.: Multidimensional zero-correlation linear attacks on FOX block cipher. J. Cryptol. Res. 2(1), 27–39 (2015)
Yi, W., Lu, L., Chen, S.: Integral and zero-correlation linear cryptanalysis of lightweight block cipher MIBS. J. Electron. Inf. Technol. 38(4), 819–826 (2016)
Canteaut, A., Fuhr, T., Gilbert, H., Naya-Plasencia, M., Reinhard, J.-R.: Multiple differential cryptanalysis of round-reduced PRINCE. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 591–610. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46706-0_30
Sakurai, S.: Prediction of sales volume based on the RFID data collected from apparel shops. Int. J. Space-Based Situated Comput. 1, 174–182 (2011)
Varaprasad, G., Murthy G, S., Jose, J., D’Souza, R.J.: Design and development of efficient algorithm for mobile ad hoc networks using cache. Int. J. Space-Based and Situated Comput. 1, 183–188 (2011)
Yuechuan, W., Yisheng, R., Xu An, W.: Security analysis of cipher ICEBERG against bit-pattern based integral attack. Int. J. Technol. Hum. Interact. (IJTHI) 12, 60–71 (2016)
Xiuguang, L., Yuanyuan, H., Ben, N., Kai, Y., Hui, L.: An exact and efficient privacy-preserving spatiotemporal matching in mobile social networks. Int. J. Technol. Hum. Interact. (IJTHI) 12, 36–47 (2016)
Ivaylo, A., Anastas, N., Evelina, P., Rozalina, D., Martin, I.: An approach to data annotation for internet of things. Int. J. Inf. Technol. Web Eng. (IJITWE) 10, 1–19 (2015)
Seghir, N.B., Kazar, O., Khaled, R.: A decentralized framework for semantic web services discovery using mobile agent. Int. J. Inf. Technol. Web Eng. (IJITWE) 10, 20–43 (2015)
Barenghi, A., Gerardo, P., Federico, T.: Secure and efficient design of software block cipher implementations on microcontrollers. Int. J. Grid Utility Comput. 4, 119–127 (2013)
Itishree, B., Chita, R.T.: Performance modelling and analysis of mobile grid computing systems. Int. J. Grid Utility Comput. 5, 21–32 (2014)
Acknowledgments
The authors would like to thank the anonymous referees for their valuable remarks. This work is partially supported by the National Natural Science Foundation of China (61202492,61572521), the Foundation of Science and Technology on Information Assurance Laboratory (KJ-15-010), the Natural Science Foundation of Shanxi Province (2016JQ6030).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Cheng, L., Pan, X., Wei, Y., Lv, L. (2018). Multidimensional Zero-Correlation Linear Cryptanalysis on PRINCE. In: Barolli, L., Zhang, M., Wang, X. (eds) Advances in Internetworking, Data & Web Technologies. EIDWT 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 6. Springer, Cham. https://doi.org/10.1007/978-3-319-59463-7_22
Download citation
DOI: https://doi.org/10.1007/978-3-319-59463-7_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-59462-0
Online ISBN: 978-3-319-59463-7
eBook Packages: EngineeringEngineering (R0)