Paper 2019/374

Probability 1 Iterated Differential in the SNEIK Permutation

Léo Perrin

Abstract

SNEIK is a permutation at the core of a submission to the NIST lightweight cryptography project. In this note, we exhibit an iterated probability 1 differential in this permutation. However, it is still unclear if this differential can be used to construct attacks against the permutation in a mode, e.g., against the hash function SNEIKHA. We also suggest a simple fix: adding a 32-bit rotation in one tap prevents this issue.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
SNEIKNIST lightweight cryptography projectDifferential CryptanalysisARXpermutation
Contact author(s)
leo perrin @ inria fr
History
2019-04-14: received
Short URL
https://ia.cr/2019/374
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/374,
      author = {Léo Perrin},
      title = {Probability 1 Iterated Differential in the SNEIK Permutation},
      howpublished = {Cryptology ePrint Archive, Paper 2019/374},
      year = {2019},
      note = {\url{https://eprint.iacr.org/2019/374}},
      url = {https://eprint.iacr.org/2019/374}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.