Abstract | ||
---|---|---|
Khudra is a hardware-oriented lightweight block cipher that is designed to run efficiently on Field Programmable Gate Arrays. It employs an 18-rounds Generalized type-2 Feistel Structure with a 64-bit block length and an 80-bit key. In this paper, we present Meet-in-the-Middle MitM attacks on 13 and 14 round-reduced Khudra. These attacks are based on finding a distinguisher that is evaluated offline independently of the key. Then in an online phase, some rounds are appended before and after the distinguisher and the correct key candidates for these rounds are checked whether they verify the distinguisher property or not. Using this technique, we find two 6-round distinguishers and use them to attack 13 and 14 rounds of Khudra with time complexity of 266.11 and 266.19, respectively. Both attacks require the same data and memory complexities of 251 chosen plaintexts and 264.8 64-bit blocks, respectively. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1007/978-3-319-24126-5_8 | SPACE |
Keywords | Field | DocType |
Cryptanalysis,Meet-in-the-middle attacks,Generalized type-2 Feistel Structure | Man-in-the-middle attack,Block cipher,Computer science,Computer security,Algorithm,Field-programmable gate array,Cryptanalysis,Time complexity,Meet in the middle | Conference |
Volume | ISSN | Citations |
9354 | 0302-9743 | 5 |
PageRank | References | Authors |
0.42 | 17 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Mohamed Tolba | 1 | 20 | 6.35 |
Ahmed Abdelkhalek 0001 | 2 | 8 | 1.49 |
Amr Youssef | 3 | 238 | 29.69 |