New Impossible Differential Cryptanalysis on Improved LBlock

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 269)

Abstract

LBlock is a 64-bit lightweight block cipher which can be implemented in both hardware environments and software platforms. It was proposed by Wu Wenling and Zhang Lei at ACNS2011. We studied the security of LBlock found that the permutation layer can getting better on security in the internet of things. In order to assure it can achieve enough security, we gave an improvement on permutation layer of LBlock. By analyzing the property of the diffusion transformation, it has shown that a new kind of 11-round impossible differential was presented. To the best of our knowledge, this is the first paper that proposes this way analysis on improved LBlock.

Keywords

LBlock Impossible differential Improved design 

References

  1. 1.
    Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw M, Seurin Y, Vikkelsoe C (2007) PRESENT: an ultra-lightweight block cipher. In: Paillier P, Verbauwhede I (eds) Cryptographic hardware and embedded systems—CHES 2007, LNCS, vol 4727. Springer, Heidelberg, pp 450–466CrossRefGoogle Scholar
  2. 2.
    Hong D, Sung J, Hong S, Lim J, Lee S, Koo B, Lee C, Chang D, Lee J, Jeong K, Kim H, Kim J, Chee S (2006) HIGHT: a new block cipher suitable for low-resource device. In: Goubin L, Matsui M (eds) CHES 2006, LNCS, vol 4249. Springer, Heidelberg, pp 46–59Google Scholar
  3. 3.
    Lim C, Korkishko T (2006) mCrypton–a lightweight block cipher for security of low-cost RFID tags and sensors. In: Song J, Kwon T, Yung M (eds) WISA 2005, LNCS, vol 3786. Springer, Heidelberg, pp 243–258Google Scholar
  4. 4.
    Leander G, Paar C, Poschmann A (2007) New lightweight DES variants. In: Biryukov A (ed) FSE 2007, LNCS, vol 4593. Springer, Heidelberg, pp 196–210Google Scholar
  5. 5.
    De Canniere C, Dunkelman O, Knezevic M (2009) KATAN and KTANTAN—a family of small and efficient hardware-oriented block ciphers. In: Clavier C, Gaj K (eds) CHES 2009, LNCS, vol 5747. Springer, Heidelberg, pp 272–288Google Scholar
  6. 6.
    Robshaw MJB (2006) Searching for compact algorithms: CGEN. In: Nguyen PQ (ed) VIETCRYPT 2006, LNCS, vol 4341. Springer, Heidelberg, pp 37–49Google Scholar
  7. 7.
    Izadi M, Sadeghiyan B, Sadeghian S, Khanooki H (2009) MIBS: A new lightweight block cipher. In: Garay JA, Miyaji A, Otsuka A (eds) CANS 2009, LNCS, vol 5888. Springer, Heidelberg, pp 334–348Google Scholar
  8. 8.
    Ojha S, Kumar N, Jain K, Sangeeta (2009) TWIS—A lightweight block cipher. In: Prakash A, Gupta I (eds) ICISS 2009, LNCS, vol 5905. Springer, Heidelberg, pp 280–291Google Scholar
  9. 9.
    Wenling W, Lei Z (2011) Applied cryptography and network security–ACNS 2011, LBlock: a lightweight block cipher. Lecture notes in computer science, vol 6715. Springer, Heidelberg, pp 327–344Google Scholar
  10. 10.
    Wu W, Zhang W, Feng D (2007) Impossible differential cryptanalysis of reduced-round ARIA and Camellia. J Comput Sci Technol 22(3):449–456CrossRefGoogle Scholar
  11. 11.
    Chen J, Jia K, Yu H, Wang X (2011) New impossible differential attack of reduced-round camellia-192 and camellia-256. In: Parampalli U, Hawkes P (eds) ACISP 2011, LNCS, vol 6812. Springer, Heidelberg, pp 16–33Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2014

Authors and Affiliations

  1. 1.School of Information Science and EngineeringShandong Normal UniversityJinanChina
  2. 2.Shandong Provincial Key Laboratory for Novel Distributed Computer Software TechnologyJinanChina

Personalised recommendations