PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract. This paper presents a block cipher that is optimized with respect to latency when implemented in hardware. Such ciphers are desirable for many future pervasive applications with real-time security needs. Our cipher, named PRINCE, allows encryption of data within one clock cycle with a very competitive chip area compared to known solutions. The fully unrolled fashion in which such algorithms need to be implemented calls for innovative design choices. The number of rounds must be moderate and rounds must have short delays in hardware. At the same time, the traditional need that a cipher has to be iterative with very similar round functions disappears, an observation that increases the design space for the algorithm. An important further requirement is that realizing decryption and encryption results in minimum additional costs. PRINCE is designed in such a way that the overhead for decryption on top of encryption is negligible. More precisely for our cipher it holds that decryption for one key corresponds to encryption with a related key. This property we refer to as $alpha $-reflection is of independent interest and we prove its soundness against generic attacks.

References in zbMATH (referenced in 21 articles , 1 standard article )

Showing results 1 to 20 of 21.
Sorted by year (citations)

1 2 next

  1. Blondeau, Céline; Nyberg, Kaisa: Perfect nonlinear functions and cryptography (2015)
  2. Canteaut, Anne; Roué, Joëlle: On the behaviors of affine equivalent Sboxes regarding differential and linear attacks (2015)
  3. Karakoç, F.; Demirci, H.; Harmancı, A.E.: AKF: a key alternating Feistel scheme for lightweight cipher designs (2015)
  4. Kölbl, Stefan; Leander, Gregor; Tiessen, Tyge: Observations on the SIMON block cipher family (2015)
  5. Lallemand, Virginie; Naya-Plasencia, María: Cryptanalysis of full sprout (2015)
  6. Leander, Gregor; Minaud, Brice; Rønjom, Sondre: A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro (2015)
  7. Soleimany, Hadi; Blondeau, Céline; Yu, Xiaoli; Wu, Wenling; Nyberg, Kaisa; Zhang, Huiling; Zhang, Lei; Wang, Yanfeng: Reflection cryptanalysis of PRINCE-like ciphers (2015)
  8. Benadjila, Ryad; Guo, Jian; Lomné, Victor; Peyrin, Thomas: Implementing lightweight block ciphers on x86 architectures (2014)
  9. Bulygin, Stanislav; Walter, Michael; Buchmann, Johannes: Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures (2014)
  10. Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi: Cryptanalysis of iterated Even-Mansour schemes with two keys (2014)
  11. Fouque, Pierre-Alain; Joux, Antoine; Mavromati, Chrysanthi: Multi-user collisions: applications to discrete logarithm, Even-Mansour and PRINCE (2014)
  12. Picek, Stjepan; Papagiannopoulos, Kostas; Ege, Barış; Batina, Lejla; Jakobovic, Domagoj: Confused by confusion: systematic evaluation of DPA resistance of various S-boxes (2014)
  13. Sarkar, Sumanta; Maitra, Subhamoy; Chakraborty, Kaushik: Differential power analysis in Hamming weight model: how to choose among (extended) affine equivalent S-boxes (2014)
  14. Sun, Siwei; Hu, Lei; Wang, Peng; Qiao, Kexin; Ma, Xiaoshuang; Song, Ling: Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers (2014)
  15. Wang, Qingju; Liu, Zhiqiang; Varıcı, Kerem; Sasaki, Yu; Rijmen, Vincent; Todo, Yosuke: Cryptanalysis of reduced-round SIMON32 and SIMON48 (2014)
  16. Isobe, Takanori; Shibutani, Kyoji: Generic key recovery attack on Feistel scheme (2013)
  17. Kuwakado, Hidenori; Hirose, Shoichi: Hashing mode using a lightweight blockcipher (2013)
  18. Minier, Marine: On the security of Piccolo lightweight block cipher against related-key impossible differentials (2013)
  19. Rechberger, Christian: On bruteforce-like cryptanalysis: new meet-in-the-middle attacks in symmetric cryptanalysis (2013)
  20. Alomair, Basel: Authenticated encryption: how reordering can impact performance (2012)

1 2 next