Cryptanalysis of KLEIN View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2015-04-19

AUTHORS

Virginie Lallemand , María Naya-Plasencia

ABSTRACT

Due to the recent emergence of resource-constrained devices, cryptographers are facing the problem of designing dedicated lightweight ciphers. KLEIN is one of the resulting primitives, proposed at RFIDSec in 2011 by Gong et al. This family of software-oriented block ciphers has an innovative structure, as it combines 4-bit Sboxes with the AES MixColumn transformation, and has woken up the attention of cryptanalysts. Several security analyses have been published, in particular on the 64-bit key version. The best of these results could attack up to 10 rounds out of the total number of 12. In this paper we propose a new family of attacks that can cryptanalyze for the first time all the 12 rounds of the complete version of KLEIN-64. Our attacks use truncated differential paths and are based both on some of the notions developed in previous attacks and on our new ideas that allow to considerably improve the performance. To prove the validity of our attacks, we have implemented reduced-round versions of them. In particular we were able to reproduce a practical attack that recovers the whole key on 10 rounds, which also corresponds to the best practical attack against KLEIN-64. More... »

PAGES

451-470

Book

TITLE

Fast Software Encryption

ISBN

978-3-662-46705-3
978-3-662-46706-0

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-662-46706-0_23

DOI

http://dx.doi.org/10.1007/978-3-662-46706-0_23

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1033463315


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Inria, Rocquencourt, France", 
          "id": "http://www.grid.ac/institutes/grid.5328.c", 
          "name": [
            "Inria, Rocquencourt, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lallemand", 
        "givenName": "Virginie", 
        "id": "sg:person.011135275143.03", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011135275143.03"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Inria, Rocquencourt, France", 
          "id": "http://www.grid.ac/institutes/grid.5328.c", 
          "name": [
            "Inria, Rocquencourt, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Naya-Plasencia", 
        "givenName": "Mar\u00eda", 
        "id": "sg:person.013206304341.94", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2015-04-19", 
    "datePublishedReg": "2015-04-19", 
    "description": "Due to the recent emergence of resource-constrained devices, cryptographers are facing the problem of designing dedicated lightweight ciphers. KLEIN is one of the resulting primitives, proposed at RFIDSec in 2011 by Gong et al. This family of software-oriented block ciphers has an innovative structure, as it combines 4-bit Sboxes with the AES MixColumn transformation, and has woken up the attention of cryptanalysts. Several security analyses have been published, in particular on the 64-bit key version. The best of these results could attack up\u00a0to 10 rounds out of the total number of 12. In this paper we propose a new family of attacks that can cryptanalyze for the first time all the 12 rounds of the complete version of KLEIN-64. Our attacks use truncated differential paths and are based both on some of the notions developed in previous attacks and on our new ideas that allow to considerably improve the performance. To prove the validity of our attacks, we have implemented reduced-round versions of them. In particular we were able to reproduce a practical attack that recovers the whole key on 10 rounds, which also corresponds to the best practical attack against KLEIN-64.", 
    "editor": [
      {
        "familyName": "Cid", 
        "givenName": "Carlos", 
        "type": "Person"
      }, 
      {
        "familyName": "Rechberger", 
        "givenName": "Christian", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-662-46706-0_23", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-662-46705-3", 
        "978-3-662-46706-0"
      ], 
      "name": "Fast Software Encryption", 
      "type": "Book"
    }, 
    "keywords": [
      "practical attacks", 
      "resource-constrained devices", 
      "best practical attack", 
      "security analysis", 
      "lightweight ciphers", 
      "AES MixColumns transformation", 
      "whole key", 
      "block cipher", 
      "MixColumns transformation", 
      "reduced-round versions", 
      "key version", 
      "attacks", 
      "cipher", 
      "previous attacks", 
      "Gong et al", 
      "cryptographers", 
      "primitives", 
      "differential path", 
      "cryptanalyst", 
      "new ideas", 
      "cryptanalysis", 
      "complete version", 
      "Sboxes", 
      "version", 
      "recent emergence", 
      "key", 
      "rounds", 
      "path", 
      "performance", 
      "devices", 
      "idea", 
      "innovative structure", 
      "notion", 
      "number", 
      "et al", 
      "attention", 
      "time", 
      "transformation", 
      "results", 
      "total number", 
      "emergence", 
      "validity", 
      "new family", 
      "analysis", 
      "structure", 
      "first time", 
      "al", 
      "family", 
      "Klein", 
      "paper", 
      "problem", 
      "KLEIN-64"
    ], 
    "name": "Cryptanalysis of KLEIN", 
    "pagination": "451-470", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1033463315"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-662-46706-0_23"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-662-46706-0_23", 
      "https://app.dimensions.ai/details/publication/pub.1033463315"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-09-02T16:10", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220902/entities/gbq_results/chapter/chapter_133.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-662-46706-0_23"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-46706-0_23'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-46706-0_23'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-46706-0_23'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-46706-0_23'


 

This table displays all metadata directly associated to this object as RDF triples.

123 TRIPLES      22 PREDICATES      76 URIs      69 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-662-46706-0_23 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Naa33f585169f42e4b090cbf35855c191
4 schema:datePublished 2015-04-19
5 schema:datePublishedReg 2015-04-19
6 schema:description Due to the recent emergence of resource-constrained devices, cryptographers are facing the problem of designing dedicated lightweight ciphers. KLEIN is one of the resulting primitives, proposed at RFIDSec in 2011 by Gong et al. This family of software-oriented block ciphers has an innovative structure, as it combines 4-bit Sboxes with the AES MixColumn transformation, and has woken up the attention of cryptanalysts. Several security analyses have been published, in particular on the 64-bit key version. The best of these results could attack up to 10 rounds out of the total number of 12. In this paper we propose a new family of attacks that can cryptanalyze for the first time all the 12 rounds of the complete version of KLEIN-64. Our attacks use truncated differential paths and are based both on some of the notions developed in previous attacks and on our new ideas that allow to considerably improve the performance. To prove the validity of our attacks, we have implemented reduced-round versions of them. In particular we were able to reproduce a practical attack that recovers the whole key on 10 rounds, which also corresponds to the best practical attack against KLEIN-64.
7 schema:editor N9500023e45d54b9cb03eaaf2ef77d124
8 schema:genre chapter
9 schema:isAccessibleForFree false
10 schema:isPartOf Nec38aa29e9094b8fbe4f86fbd5f7ad74
11 schema:keywords AES MixColumns transformation
12 Gong et al
13 KLEIN-64
14 Klein
15 MixColumns transformation
16 Sboxes
17 al
18 analysis
19 attacks
20 attention
21 best practical attack
22 block cipher
23 cipher
24 complete version
25 cryptanalysis
26 cryptanalyst
27 cryptographers
28 devices
29 differential path
30 emergence
31 et al
32 family
33 first time
34 idea
35 innovative structure
36 key
37 key version
38 lightweight ciphers
39 new family
40 new ideas
41 notion
42 number
43 paper
44 path
45 performance
46 practical attacks
47 previous attacks
48 primitives
49 problem
50 recent emergence
51 reduced-round versions
52 resource-constrained devices
53 results
54 rounds
55 security analysis
56 structure
57 time
58 total number
59 transformation
60 validity
61 version
62 whole key
63 schema:name Cryptanalysis of KLEIN
64 schema:pagination 451-470
65 schema:productId Nc43a9a172bd24e8d8a9e614b8c02bd14
66 Neb8bd01f87b14e53ac26b3e1fd6a00fb
67 schema:publisher Nd607fb24b37a4111834b8215baee82fc
68 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033463315
69 https://doi.org/10.1007/978-3-662-46706-0_23
70 schema:sdDatePublished 2022-09-02T16:10
71 schema:sdLicense https://scigraph.springernature.com/explorer/license/
72 schema:sdPublisher N2e2227c8f27c4b418e91280d78e2e38a
73 schema:url https://doi.org/10.1007/978-3-662-46706-0_23
74 sgo:license sg:explorer/license/
75 sgo:sdDataset chapters
76 rdf:type schema:Chapter
77 N037442d3b49d4ed9b342762f6e9565e9 schema:familyName Rechberger
78 schema:givenName Christian
79 rdf:type schema:Person
80 N295bcb5aa7354d528ed6a19a5a6a71a8 rdf:first N037442d3b49d4ed9b342762f6e9565e9
81 rdf:rest rdf:nil
82 N2e2227c8f27c4b418e91280d78e2e38a schema:name Springer Nature - SN SciGraph project
83 rdf:type schema:Organization
84 N611d3400c2954c1fb61b7c78a7d81c24 schema:familyName Cid
85 schema:givenName Carlos
86 rdf:type schema:Person
87 N78fa881370b2408aa1f0881c0cf68990 rdf:first sg:person.013206304341.94
88 rdf:rest rdf:nil
89 N9500023e45d54b9cb03eaaf2ef77d124 rdf:first N611d3400c2954c1fb61b7c78a7d81c24
90 rdf:rest N295bcb5aa7354d528ed6a19a5a6a71a8
91 Naa33f585169f42e4b090cbf35855c191 rdf:first sg:person.011135275143.03
92 rdf:rest N78fa881370b2408aa1f0881c0cf68990
93 Nc43a9a172bd24e8d8a9e614b8c02bd14 schema:name doi
94 schema:value 10.1007/978-3-662-46706-0_23
95 rdf:type schema:PropertyValue
96 Nd607fb24b37a4111834b8215baee82fc schema:name Springer Nature
97 rdf:type schema:Organisation
98 Neb8bd01f87b14e53ac26b3e1fd6a00fb schema:name dimensions_id
99 schema:value pub.1033463315
100 rdf:type schema:PropertyValue
101 Nec38aa29e9094b8fbe4f86fbd5f7ad74 schema:isbn 978-3-662-46705-3
102 978-3-662-46706-0
103 schema:name Fast Software Encryption
104 rdf:type schema:Book
105 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
106 schema:name Information and Computing Sciences
107 rdf:type schema:DefinedTerm
108 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
109 schema:name Data Format
110 rdf:type schema:DefinedTerm
111 sg:person.011135275143.03 schema:affiliation grid-institutes:grid.5328.c
112 schema:familyName Lallemand
113 schema:givenName Virginie
114 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011135275143.03
115 rdf:type schema:Person
116 sg:person.013206304341.94 schema:affiliation grid-institutes:grid.5328.c
117 schema:familyName Naya-Plasencia
118 schema:givenName María
119 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94
120 rdf:type schema:Person
121 grid-institutes:grid.5328.c schema:alternateName Inria, Rocquencourt, France
122 schema:name Inria, Rocquencourt, France
123 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...