eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.

Paper 2020/1072

Cryptanalysis of the permutation based algorithm SpoC

Liliya Kraleva, Raluca Posteuca, and Vincent Rijmen

Abstract

In this paper we present an analysis of the SpoC cipher, a second round candidate of the NIST Lightweight Crypto Standardization process. First we present a differential analysis on the sLiSCP-light permutation, a core element of SpoC. Then we propose a series of attacks on both versions of SpoC, namely round-reduced differential tag forgery and message recovery attacks, as well as a time-memory trade-off key-recovery attack on the full round version of Spoc-64. Finally, we present an observation regarding the constants used in the sLiSCP-light permutation. To the best of our knowledge, this paper represents the first third-party analysis on both SpoC cipher and the sLiSCP-light permutation.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Contact author(s)
lkraleva @ esat kuleuven be
raluca posteuca @ esat kuleuven be
History
2020-09-09: received
Short URL
https://ia.cr/2020/1072
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2020/1072,
      author = {Liliya Kraleva and Raluca Posteuca and Vincent Rijmen},
      title = {Cryptanalysis of the permutation based algorithm SpoC},
      howpublished = {Cryptology ePrint Archive, Paper 2020/1072},
      year = {2020},
      note = {\url{https://eprint.iacr.org/2020/1072}},
      url = {https://eprint.iacr.org/2020/1072}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.