Paper 2017/743
Cryptanalysis of 22 1/2 rounds of Gimli
Mike Hamburg
Abstract
Bernstein et al. have proposed a new permutation, Gimli, which aims to provide simple and performant implementations on a wide variety of platforms. One of the tricks used to make Gimli performant is that it processes data mostly in 96-bit columns, only occasionally swapping 32-bit words between them.
Here we show that this trick is dangerous by presenting a distinguisher for reduced-round Gimli. Our distinguisher takes the form of an attack on a simple and practical PRF that should be nearly 192-bit secure. Gimli has 24 rounds. Against 15.5 of those rounds, our distinguisher uses two known plaintexts, takes about
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- cryptanalysispermutation-based cryptographymeet-in-the-middle attack
- Contact author(s)
- mike @ shiftleft org
- History
- 2017-08-07: received
- Short URL
- https://ia.cr/2017/743
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2017/743, author = {Mike Hamburg}, title = {Cryptanalysis of 22 1/2 rounds of Gimli}, howpublished = {Cryptology {ePrint} Archive, Paper 2017/743}, year = {2017}, url = {https://eprint.iacr.org/2017/743} }