3-subset meet-in-the-middle attack on block cipher TWIS

To do further analysis of the security of lightweight block cipher TWIS, 3-subset meet-in-the-middle attack was applied to 10-round TWIS without the final whitening. Based on the weakness in the key schedule of TWIS:its ac-tual key size was only 62-bit and the confusion speed of the initial key was...

Full description

Saved in:
Bibliographic Details
Main Authors: Ya-fei ZHENG, Hong-ru WEI
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2014-06-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.06.023/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539757671186432
author Ya-fei ZHENG
Hong-ru WEI
author_facet Ya-fei ZHENG
Hong-ru WEI
author_sort Ya-fei ZHENG
collection DOAJ
description To do further analysis of the security of lightweight block cipher TWIS, 3-subset meet-in-the-middle attack was applied to 10-round TWIS without the final whitening. Based on the weakness in the key schedule of TWIS:its ac-tual key size was only 62-bit and the confusion speed of the initial key was rather slow, the time complexity to recover the whole 62-bit key of 10-round TWIS was 2<sup>45</sup>, and the data complexity was low enough with only one known plain-text-ciphertext pair. The result shows that block cipher TWIS is not secure under 3-subset meet-in-the-middle attack.
format Article
id doaj-art-acb504b3e2bd47d79f6813e37c6d59dd
institution Kabale University
issn 1000-436X
language zho
publishDate 2014-06-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-acb504b3e2bd47d79f6813e37c6d59dd2025-01-14T06:43:38ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2014-06-0135180184596823943-subset meet-in-the-middle attack on block cipher TWISYa-fei ZHENGHong-ru WEITo do further analysis of the security of lightweight block cipher TWIS, 3-subset meet-in-the-middle attack was applied to 10-round TWIS without the final whitening. Based on the weakness in the key schedule of TWIS:its ac-tual key size was only 62-bit and the confusion speed of the initial key was rather slow, the time complexity to recover the whole 62-bit key of 10-round TWIS was 2<sup>45</sup>, and the data complexity was low enough with only one known plain-text-ciphertext pair. The result shows that block cipher TWIS is not secure under 3-subset meet-in-the-middle attack.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.06.023/block cipherTWISmeet-in-the-middle attackcomplexity
spellingShingle Ya-fei ZHENG
Hong-ru WEI
3-subset meet-in-the-middle attack on block cipher TWIS
Tongxin xuebao
block cipher
TWIS
meet-in-the-middle attack
complexity
title 3-subset meet-in-the-middle attack on block cipher TWIS
title_full 3-subset meet-in-the-middle attack on block cipher TWIS
title_fullStr 3-subset meet-in-the-middle attack on block cipher TWIS
title_full_unstemmed 3-subset meet-in-the-middle attack on block cipher TWIS
title_short 3-subset meet-in-the-middle attack on block cipher TWIS
title_sort 3 subset meet in the middle attack on block cipher twis
topic block cipher
TWIS
meet-in-the-middle attack
complexity
url http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.06.023/
work_keys_str_mv AT yafeizheng 3subsetmeetinthemiddleattackonblockciphertwis
AT hongruwei 3subsetmeetinthemiddleattackonblockciphertwis