The Journal of Supercomputing

, Volume 70, Issue 1, pp 95–103 | Cite as

Biclique cryptanalysis of PRESENT-80 and PRESENT-128

  • Changhoon Lee


In this paper, we evaluate the security of lightweight block ciphers PRESENT-80 and PRESENT-128 applicable to hybrid information systems against biclique cryptanalysis. To recover the secret key of PRESENT-80/128, our attacks require \(2^{79.76}\) full PRESENT-80 encryptions and \(2^{127.91}\) full PRESENT-128 encryptions, respectively. These results are superior to known biclique cryptanalytic results on them.


Block cipher PRESENT Biclique Cryptanalysis 


  1. 1.
    Abed F, Forler C, List E, Lucks S, Wenzel J (2012) Biclique cryptanalysis of the PRESENT and LED lightweight ciphers. Cryptology ePrint Archive, Report 2012/591Google Scholar
  2. 2.
    Bogdanov A, Khovratovich D, Rechberger C (2011) Biclique cryptanalysis of the full AES. In: ASIACRYPT 2011. LNCS, vol 7073. IACR, Lyon, pp 344–371Google Scholar
  3. 3.
    Bogdanov A, Knudsen L, Leander G, Paar C, Poschmann A, Robshaw M, Seurin Y, Vikkelsoe C (2007) PRESENT: an ultra-lightweight block cipher. In: CHES 2007. LNCS, vol 4727. Springer, Berlin, pp 450–466Google Scholar
  4. 4.
    Chen S (2012) Biclique attack of the full ARIA-256. Cryptology ePrint Archive, Report 2012/011Google Scholar
  5. 5.
    Jeong K, Kang H, Lee C, Sung J, Hong S, Lim J (2013) Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis. Peer-to-peer networking and applications. Springer, USAGoogle Scholar
  6. 6.
    Çoban M, Karakoç F, Biztaş Ö (2012) Biclique Cryptanalysis of TWINE. Cryptology ePrint Archive, Report 2012/422Google Scholar
  7. 7.
    Hong D, Koo B, Kwon D (2012) Biclique attack on the full HIGHT. In: ICISC 2011. LNCS, vol 7259. Springer, Berlin, pp 365–374Google Scholar
  8. 8.
    Khovratovich D, Leurent G, Rechberger C (2012) Narrow-Bicliques: cryptanalysis of Full IDEA. In: EUROCRYPT 2012. LNCS, vol 7237. IACR, Lyon, pp 392–410Google Scholar
  9. 9.
    Lee S, Kim D, Yi J, Ro W (2013) An efficient block cipher implementation on many-core graphics processing units. J Inf Process Syst 8(1):159–174CrossRefGoogle Scholar
  10. 10.
    Nakahara Jr J, Sepehrdad P, Zhang B, Wang M (2009) Linear (Hull) and algebraic cryptanalysis of the block cipher PRESENT. In: CANS 2009. LNCS, vol 5888. Springer, Berlin, pp 58–75Google Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  1. 1.Seoul National University of Science and TechnologySeoulKorea

Personalised recommendations