General | |
---|---|
Designers | Technical University of Denmark, INRIA, Ruhr University Bochum and NXP Semiconductors |
First published | 2012 |
Derived from | AES, PRESENT |
Cipher detail | |
Key sizes | 128 bits |
Block sizes | 64 bits |
Structure | SPN |
Rounds | 11 (but 12 non-linear layers) |
Best public cryptanalysis | |
a single key can be recovered with a computational complexity of 2125.47 using the structural linear relations.[1]
In the related key setting, the data complexity is 233 and the time complexity 264.[1] Using related key boomerang attack the complexity is 239 for both data and time.[1] |
Prince is a block cipher targeting low latency, unrolled hardware implementations. It is based on the so-called FX construction.[2] Its most notable feature is the alpha reflection: the decryption is the encryption with a related key which is very cheap to compute. Unlike most other "lightweight" ciphers, it has a small number of rounds and the layers constituting a round have low logic depth. As a result, fully unrolled implementation are able to reach much higher frequencies than AES or PRESENT. According to the authors, for the same time constraints and technologies, PRINCE uses 6–7 times less area than PRESENT-80 and 14–15 times less area than AES-128.[3]
Security analysis of PRINCE
was invoked but never defined (see the help page).
{{cite journal}}
: Cite journal requires |journal=
(help)
© MMXXIII Rich X Search. We shall prevail. All rights reserved. Rich X Search