2016-2017 Competition

The first edition of the cryptanalysis competition has been held in 2016, until March 1, 2017.
The slides announcing the competition can be found here and the slides announcing the results can be found here 

Skinny Cryptanalysis Challenges

For the first edition of the cryptanalysis competition, we proposed 5 cryptanalysis categories, where the authors could chose a selection a gifts as awards depending on the number of attacked rounds. The list of countries is the list of Skinny's author affiliations: Denmark, France, Germany, Japan and Singapore.
The concrete challenges were:
  • 26 rounds of SKINNY-64-128 or 30 rounds of SKINNY-128-128 gets 5 presents (one from each country)
  • 24 rounds of SKINNY-64-128 or 28 rounds of SKINNY-128-128 gets 4 presents from 4 different countries (chosen by the winner)
  • 22 rounds of SKINNY-64-128 or 26 rounds of SKINNY-128-128 gets 3 presents from 3 different countries (chosen by the winner)
  • 20 rounds of SKINNY-64-128 or 24 rounds of SKINNY-128-128 gets 2 presents from 2 different countries (chosen by the winner)
  • 18 rounds of SKINNY-64-128 or 22 rounds of SKINNY-128-128 gets 1 present (country chosen by the winner)

Rules of the Competition
  • the SKINNY designers will judge the best attack submitted after the deadline, but main criterion will be: final complexity (computations, data and memory), application to other Skinny versions, novelty of the attack techniques, attack model, etc.
  • attacks from the SKINNY document count as already existing attacks
  • if some attacks are similar, the first submitted has priority
  • types of attacks:
    • single-key and related-key attacks qualify for the competition
    • we will decide separately if accelerated brute force (e.g. biclique attacks) qualifies for the competition
    • related-cipher attacks, known or chosen-key attacks do not qualify for the competition
    • tweak is allowed for of up to 64 bits for SKINNY-64-128 (but in that case, security claim is 2k where k is the key size)

Winners of the Competitions

We would like to thank all the teams that spent time analysing Skinny. We have decided to deliver the following awards to two research teams:
  • "Related-Key Impossible-Differential Attack on Reduced-Round SKINNY" by R. Ankele, S. Banik, A. Chakraborti, E. List, F. Mendel, S.M. Sim and G. Wang, for being the first submitted work to successfully attack up to 20 rounds of Skinny-64-128. They will receive the prices for the 18 and 20-round targets of Skinny-64-128 (3 gifts in total)
  • "Security Analysis of SKINNY under Related-Tweakey Settings" by G. Liu, M. Ghosh and L. Song, for being the first submitted work to successfully attack up to 23 rounds of Skinny-64-128. They will receive the prices for the 22-round target of Skinny-64-128 (3 gifts in total)

Information on the subsequent edition of the Skinny cryptanalysis competition can be found here.