Cryptanalysis of KLEIN View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2015-04-19

AUTHORS

Virginie Lallemand , María Naya-Plasencia

ABSTRACT

Due to the recent emergence of resource-constrained devices, cryptographers are facing the problem of designing dedicated lightweight ciphers. KLEIN is one of the resulting primitives, proposed at RFIDSec in 2011 by Gong et al. This family of software-oriented block ciphers has an innovative structure, as it combines 4-bit Sboxes with the AES MixColumn transformation, and has woken up the attention of cryptanalysts. Several security analyses have been published, in particular on the 64-bit key version. The best of these results could attack up to 10 rounds out of the total number of 12. In this paper we propose a new family of attacks that can cryptanalyze for the first time all the 12 rounds of the complete version of KLEIN-64. Our attacks use truncated differential paths and are based both on some of the notions developed in previous attacks and on our new ideas that allow to considerably improve the performance. To prove the validity of our attacks, we have implemented reduced-round versions of them. In particular we were able to reproduce a practical attack that recovers the whole key on 10 rounds, which also corresponds to the best practical attack against KLEIN-64. More... »

PAGES

451-470

Book

TITLE

Fast Software Encryption

ISBN

978-3-662-46705-3
978-3-662-46706-0

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-662-46706-0_23

DOI

http://dx.doi.org/10.1007/978-3-662-46706-0_23

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1033463315


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Inria, Rocquencourt, France", 
          "id": "http://www.grid.ac/institutes/grid.5328.c", 
          "name": [
            "Inria, Rocquencourt, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lallemand", 
        "givenName": "Virginie", 
        "id": "sg:person.011135275143.03", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011135275143.03"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Inria, Rocquencourt, France", 
          "id": "http://www.grid.ac/institutes/grid.5328.c", 
          "name": [
            "Inria, Rocquencourt, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Naya-Plasencia", 
        "givenName": "Mar\u00eda", 
        "id": "sg:person.013206304341.94", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2015-04-19", 
    "datePublishedReg": "2015-04-19", 
    "description": "Due to the recent emergence of resource-constrained devices, cryptographers are facing the problem of designing dedicated lightweight ciphers. KLEIN is one of the resulting primitives, proposed at RFIDSec in 2011 by Gong et al. This family of software-oriented block ciphers has an innovative structure, as it combines 4-bit Sboxes with the AES MixColumn transformation, and has woken up the attention of cryptanalysts. Several security analyses have been published, in particular on the 64-bit key version. The best of these results could attack up\u00a0to 10 rounds out of the total number of 12. In this paper we propose a new family of attacks that can cryptanalyze for the first time all the 12 rounds of the complete version of KLEIN-64. Our attacks use truncated differential paths and are based both on some of the notions developed in previous attacks and on our new ideas that allow to considerably improve the performance. To prove the validity of our attacks, we have implemented reduced-round versions of them. In particular we were able to reproduce a practical attack that recovers the whole key on 10 rounds, which also corresponds to the best practical attack against KLEIN-64.", 
    "editor": [
      {
        "familyName": "Cid", 
        "givenName": "Carlos", 
        "type": "Person"
      }, 
      {
        "familyName": "Rechberger", 
        "givenName": "Christian", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-662-46706-0_23", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-662-46705-3", 
        "978-3-662-46706-0"
      ], 
      "name": "Fast Software Encryption", 
      "type": "Book"
    }, 
    "keywords": [
      "practical attacks", 
      "resource-constrained devices", 
      "best practical attack", 
      "security analysis", 
      "lightweight ciphers", 
      "AES MixColumns transformation", 
      "whole key", 
      "block cipher", 
      "MixColumns transformation", 
      "reduced-round versions", 
      "key version", 
      "attacks", 
      "cipher", 
      "previous attacks", 
      "Gong et al", 
      "cryptographers", 
      "primitives", 
      "differential path", 
      "cryptanalyst", 
      "new ideas", 
      "cryptanalysis", 
      "complete version", 
      "Sboxes", 
      "version", 
      "recent emergence", 
      "key", 
      "rounds", 
      "path", 
      "performance", 
      "devices", 
      "idea", 
      "innovative structure", 
      "notion", 
      "number", 
      "et al", 
      "attention", 
      "time", 
      "transformation", 
      "results", 
      "total number", 
      "emergence", 
      "validity", 
      "new family", 
      "analysis", 
      "structure", 
      "first time", 
      "al", 
      "family", 
      "Klein", 
      "paper", 
      "problem", 
      "KLEIN-64"
    ], 
    "name": "Cryptanalysis of KLEIN", 
    "pagination": "451-470", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1033463315"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-662-46706-0_23"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-662-46706-0_23", 
      "https://app.dimensions.ai/details/publication/pub.1033463315"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-12-01T06:52", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/chapter/chapter_365.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-662-46706-0_23"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-46706-0_23'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-46706-0_23'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-46706-0_23'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-46706-0_23'


 

This table displays all metadata directly associated to this object as RDF triples.

123 TRIPLES      22 PREDICATES      76 URIs      69 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-662-46706-0_23 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Na68953c5b3b1460b97ac91058512fc13
4 schema:datePublished 2015-04-19
5 schema:datePublishedReg 2015-04-19
6 schema:description Due to the recent emergence of resource-constrained devices, cryptographers are facing the problem of designing dedicated lightweight ciphers. KLEIN is one of the resulting primitives, proposed at RFIDSec in 2011 by Gong et al. This family of software-oriented block ciphers has an innovative structure, as it combines 4-bit Sboxes with the AES MixColumn transformation, and has woken up the attention of cryptanalysts. Several security analyses have been published, in particular on the 64-bit key version. The best of these results could attack up to 10 rounds out of the total number of 12. In this paper we propose a new family of attacks that can cryptanalyze for the first time all the 12 rounds of the complete version of KLEIN-64. Our attacks use truncated differential paths and are based both on some of the notions developed in previous attacks and on our new ideas that allow to considerably improve the performance. To prove the validity of our attacks, we have implemented reduced-round versions of them. In particular we were able to reproduce a practical attack that recovers the whole key on 10 rounds, which also corresponds to the best practical attack against KLEIN-64.
7 schema:editor N8306b6e7021a4c578a8754f4bce38cd8
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N0f1839ec8fcc4f35bfb88193ab4272bc
11 schema:keywords AES MixColumns transformation
12 Gong et al
13 KLEIN-64
14 Klein
15 MixColumns transformation
16 Sboxes
17 al
18 analysis
19 attacks
20 attention
21 best practical attack
22 block cipher
23 cipher
24 complete version
25 cryptanalysis
26 cryptanalyst
27 cryptographers
28 devices
29 differential path
30 emergence
31 et al
32 family
33 first time
34 idea
35 innovative structure
36 key
37 key version
38 lightweight ciphers
39 new family
40 new ideas
41 notion
42 number
43 paper
44 path
45 performance
46 practical attacks
47 previous attacks
48 primitives
49 problem
50 recent emergence
51 reduced-round versions
52 resource-constrained devices
53 results
54 rounds
55 security analysis
56 structure
57 time
58 total number
59 transformation
60 validity
61 version
62 whole key
63 schema:name Cryptanalysis of KLEIN
64 schema:pagination 451-470
65 schema:productId N485df6f287b04db381ac823eac31445e
66 N57d9a18741fc4edf80609bd29f3a423a
67 schema:publisher Nb12f38d4bf654280b4973b051ca5bcf7
68 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033463315
69 https://doi.org/10.1007/978-3-662-46706-0_23
70 schema:sdDatePublished 2022-12-01T06:52
71 schema:sdLicense https://scigraph.springernature.com/explorer/license/
72 schema:sdPublisher N620867a532424af481e607404b5fe44c
73 schema:url https://doi.org/10.1007/978-3-662-46706-0_23
74 sgo:license sg:explorer/license/
75 sgo:sdDataset chapters
76 rdf:type schema:Chapter
77 N0f1839ec8fcc4f35bfb88193ab4272bc schema:isbn 978-3-662-46705-3
78 978-3-662-46706-0
79 schema:name Fast Software Encryption
80 rdf:type schema:Book
81 N485df6f287b04db381ac823eac31445e schema:name doi
82 schema:value 10.1007/978-3-662-46706-0_23
83 rdf:type schema:PropertyValue
84 N57d9a18741fc4edf80609bd29f3a423a schema:name dimensions_id
85 schema:value pub.1033463315
86 rdf:type schema:PropertyValue
87 N6029b64a8cf34227a5182ff2d70b0afd rdf:first Nbefe08ce94054e3098c1b76854c0e15a
88 rdf:rest rdf:nil
89 N620867a532424af481e607404b5fe44c schema:name Springer Nature - SN SciGraph project
90 rdf:type schema:Organization
91 N8306b6e7021a4c578a8754f4bce38cd8 rdf:first Nf5adb98d4feb46a2ada9a146d2844040
92 rdf:rest N6029b64a8cf34227a5182ff2d70b0afd
93 Na68953c5b3b1460b97ac91058512fc13 rdf:first sg:person.011135275143.03
94 rdf:rest Nb086987f016f4fc986706f86d9ff316c
95 Nb086987f016f4fc986706f86d9ff316c rdf:first sg:person.013206304341.94
96 rdf:rest rdf:nil
97 Nb12f38d4bf654280b4973b051ca5bcf7 schema:name Springer Nature
98 rdf:type schema:Organisation
99 Nbefe08ce94054e3098c1b76854c0e15a schema:familyName Rechberger
100 schema:givenName Christian
101 rdf:type schema:Person
102 Nf5adb98d4feb46a2ada9a146d2844040 schema:familyName Cid
103 schema:givenName Carlos
104 rdf:type schema:Person
105 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
106 schema:name Information and Computing Sciences
107 rdf:type schema:DefinedTerm
108 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
109 schema:name Data Format
110 rdf:type schema:DefinedTerm
111 sg:person.011135275143.03 schema:affiliation grid-institutes:grid.5328.c
112 schema:familyName Lallemand
113 schema:givenName Virginie
114 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011135275143.03
115 rdf:type schema:Person
116 sg:person.013206304341.94 schema:affiliation grid-institutes:grid.5328.c
117 schema:familyName Naya-Plasencia
118 schema:givenName María
119 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94
120 rdf:type schema:Person
121 grid-institutes:grid.5328.c schema:alternateName Inria, Rocquencourt, France
122 schema:name Inria, Rocquencourt, France
123 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...