2020
DOI: 10.1007/978-3-030-65277-7_12
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of the Permutation Based Algorithm SpoC

Abstract: In this paper we present an analysis of the SpoC cipher, a second round candidate of the NIST Lightweight Crypto Standardization process. First we present a differential analysis on the sLiSCP-light permutation, a core element of SpoC. Then we propose a series of attacks on both versions of SpoC, namely round-reduced differential tag forgery and message recovery attacks, as well as a time-memory tradeoff key-recovery attack on the full round version of Spoc-64. Finally, we present an observation regarding the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…SPIX and one of the SpoC variants use similar sLiSCP-light- [256] permutations. Differential characteristics [214][215][216] and distinguishers [217] on sLiSCPlight [256], summarized in Section 3.2.26, are also applicable to SPIX.…”
Section: Spixmentioning
confidence: 99%
See 1 more Smart Citation
“…SPIX and one of the SpoC variants use similar sLiSCP-light- [256] permutations. Differential characteristics [214][215][216] and distinguishers [217] on sLiSCPlight [256], summarized in Section 3.2.26, are also applicable to SPIX.…”
Section: Spixmentioning
confidence: 99%
“…Security Analysis. Kraleva et al [214][215][216] described differential characteristics of sLiSCPlight- [256] and sLiSCP-light- [192] that covered six, seven, or nine steps, as well as corresponding attacks on reduced-step SpoC-64 and SpoC-128 variants. A key recovery attack on full SpoC-64 was presented that does not violate the security claims due to large data requirements.…”
Section: Spocmentioning
confidence: 99%
“…Both libraries support many block ciphers and several distinguishing attacks, namely differential and linear cryptanalysis in CryptoSMT and (related‐key) differential, RX, and (related‐key) impossible‐differential in ArxPy, and they have been used in multiple studies, for example, Refs. [23–26] or [27–30]. However, these two libraries present severe limitations.…”
Section: Introductionmentioning
confidence: 99%