Cryptanalysis on PHOTON hash function using cube attack

Chia Yu Lu, You Wei Lin, Shang Ming Jen, Jar Ferr Yang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

The lightweight hash function PHOTON has shown excellent hardware compactness which almost reaches the theoretical optimum and brings benefits for on-tag applications. Unlike cryptanalysis which tries to find collisions or build distinguishers on PHOTON, we apply cube attack for secret recovery of PHOTON. We focus on 1 to 3 round of PHOTON-128/16/16 in our experiments. Using cube attack, we show at least half of the message bits can be recovered. When more powerful computing capability is used, it is possible to recover more bits of the message in the same number of PHOTON rounds.

Original languageEnglish
Title of host publicationProceedings - 3rd International Conference on Information Security and Intelligent Control, ISIC 2012
Pages278-281
Number of pages4
DOIs
Publication statusPublished - 2012 Dec 1
Event3rd International Conference on Information Security and Intelligent Control, ISIC 2012 - Yunlin, Taiwan
Duration: 2012 Aug 142012 Aug 16

Publication series

NameProceedings - 3rd International Conference on Information Security and Intelligent Control, ISIC 2012

Other

Other3rd International Conference on Information Security and Intelligent Control, ISIC 2012
CountryTaiwan
CityYunlin
Period12-08-1412-08-16

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Information Systems

Fingerprint Dive into the research topics of 'Cryptanalysis on PHOTON hash function using cube attack'. Together they form a unique fingerprint.

  • Cite this

    Lu, C. Y., Lin, Y. W., Jen, S. M., & Yang, J. F. (2012). Cryptanalysis on PHOTON hash function using cube attack. In Proceedings - 3rd International Conference on Information Security and Intelligent Control, ISIC 2012 (pp. 278-281). [6449760] (Proceedings - 3rd International Conference on Information Security and Intelligent Control, ISIC 2012). https://doi.org/10.1109/ISIC.2012.6449760