TY - GEN
T1 - Cryptanalysis on PHOTON hash function using cube attack
AU - Lu, Chia Yu
AU - Lin, You Wei
AU - Jen, Shang Ming
AU - Yang, Jar Ferr
PY - 2012
Y1 - 2012
N2 - The lightweight hash function PHOTON has shown excellent hardware compactness which almost reaches the theoretical optimum and brings benefits for on-tag applications. Unlike cryptanalysis which tries to find collisions or build distinguishers on PHOTON, we apply cube attack for secret recovery of PHOTON. We focus on 1 to 3 round of PHOTON-128/16/16 in our experiments. Using cube attack, we show at least half of the message bits can be recovered. When more powerful computing capability is used, it is possible to recover more bits of the message in the same number of PHOTON rounds.
AB - The lightweight hash function PHOTON has shown excellent hardware compactness which almost reaches the theoretical optimum and brings benefits for on-tag applications. Unlike cryptanalysis which tries to find collisions or build distinguishers on PHOTON, we apply cube attack for secret recovery of PHOTON. We focus on 1 to 3 round of PHOTON-128/16/16 in our experiments. Using cube attack, we show at least half of the message bits can be recovered. When more powerful computing capability is used, it is possible to recover more bits of the message in the same number of PHOTON rounds.
UR - https://www.scopus.com/pages/publications/84874450612
UR - https://www.scopus.com/pages/publications/84874450612#tab=citedBy
U2 - 10.1109/ISIC.2012.6449760
DO - 10.1109/ISIC.2012.6449760
M3 - Conference contribution
AN - SCOPUS:84874450612
SN - 9781467325882
T3 - Proceedings - 3rd International Conference on Information Security and Intelligent Control, ISIC 2012
SP - 278
EP - 281
BT - Proceedings - 3rd International Conference on Information Security and Intelligent Control, ISIC 2012
T2 - 3rd International Conference on Information Security and Intelligent Control, ISIC 2012
Y2 - 14 August 2012 through 16 August 2012
ER -