Advertisement

The Journal of Supercomputing

, Volume 70, Issue 1, pp 95–103 | Cite as

Biclique cryptanalysis of PRESENT-80 and PRESENT-128

  • Changhoon Lee
Article

Abstract

In this paper, we evaluate the security of lightweight block ciphers PRESENT-80 and PRESENT-128 applicable to hybrid information systems against biclique cryptanalysis. To recover the secret key of PRESENT-80/128, our attacks require \(2^{79.76}\) full PRESENT-80 encryptions and \(2^{127.91}\) full PRESENT-128 encryptions, respectively. These results are superior to known biclique cryptanalytic results on them.

Keywords

Block cipher PRESENT Biclique Cryptanalysis 

References

  1. 1.
    Abed F, Forler C, List E, Lucks S, Wenzel J (2012) Biclique cryptanalysis of the PRESENT and LED lightweight ciphers. Cryptology ePrint Archive, Report 2012/591Google Scholar
  2. 2.
    Bogdanov A, Khovratovich D, Rechberger C (2011) Biclique cryptanalysis of the full AES. In: ASIACRYPT 2011. LNCS, vol 7073. IACR, Lyon, pp 344–371Google Scholar
  3. 3.
    Bogdanov A, Knudsen L, Leander G, Paar C, Poschmann A, Robshaw M, Seurin Y, Vikkelsoe C (2007) PRESENT: an ultra-lightweight block cipher. In: CHES 2007. LNCS, vol 4727. Springer, Berlin, pp 450–466Google Scholar
  4. 4.
    Chen S (2012) Biclique attack of the full ARIA-256. Cryptology ePrint Archive, Report 2012/011Google Scholar
  5. 5.
    Jeong K, Kang H, Lee C, Sung J, Hong S, Lim J (2013) Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis. Peer-to-peer networking and applications. Springer, USAGoogle Scholar
  6. 6.
    Çoban M, Karakoç F, Biztaş Ö (2012) Biclique Cryptanalysis of TWINE. Cryptology ePrint Archive, Report 2012/422Google Scholar
  7. 7.
    Hong D, Koo B, Kwon D (2012) Biclique attack on the full HIGHT. In: ICISC 2011. LNCS, vol 7259. Springer, Berlin, pp 365–374Google Scholar
  8. 8.
    Khovratovich D, Leurent G, Rechberger C (2012) Narrow-Bicliques: cryptanalysis of Full IDEA. In: EUROCRYPT 2012. LNCS, vol 7237. IACR, Lyon, pp 392–410Google Scholar
  9. 9.
    Lee S, Kim D, Yi J, Ro W (2013) An efficient block cipher implementation on many-core graphics processing units. J Inf Process Syst 8(1):159–174CrossRefGoogle Scholar
  10. 10.
    Nakahara Jr J, Sepehrdad P, Zhang B, Wang M (2009) Linear (Hull) and algebraic cryptanalysis of the block cipher PRESENT. In: CANS 2009. LNCS, vol 5888. Springer, Berlin, pp 58–75Google Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  1. 1.Seoul National University of Science and TechnologySeoulKorea

Personalised recommendations