Key Recovery Attacks on Fantomas and Robin Using Related-Key Differentials

Vol. 28, No. 4, pp. 803-807, Jul. 2018
10.13089/JKIISC.2018.28.4.803, Full Text:
Keywords: Fantomas, Robin, LS-design, Related-key attack, Differential Path, Key recovery attack
Abstract

The Fantomas and the Robin are the block ciphers included in the LS-designs, the family of block ciphers. They aredesigned to efficiently apply the masking technique, which is a side-channel analysis countermeasure technique, usingL-boxes and S-boxes capable of bit slice implementation. In this paper, we show that the key recovery attacks of Fantomasand Robin through the related-key differential analysis are possible with 2^56 and 2^72 time complexity, 2^56 and 2^69 chosen plaintext respectively.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
김한기 and 김종성, "Key Recovery Attacks on Fantomas and Robin Using Related-Key Differentials," Journal of The Korea Institute of Information Security and Cryptology, vol. 28, no. 4, pp. 803-807, 2018. DOI: 10.13089/JKIISC.2018.28.4.803.

[ACM Style]
김한기 and 김종성. 2018. Key Recovery Attacks on Fantomas and Robin Using Related-Key Differentials. Journal of The Korea Institute of Information Security and Cryptology, 28, 4, (2018), 803-807. DOI: 10.13089/JKIISC.2018.28.4.803.