Improved Biclique Cryptanalysis of the Lightweight Block Cipher Piccolo

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED

Abstract. In this paper, we evaluate the security of lightweight block ciphers PRESENT, Piccolo and LED against biclique cryptanalysis. To recover the secret key of PRESENT-80/128, our attacks require 2 full PRESENT-80 encryptions and 2 full PRESENT-128 encryptions, respectively. Our attacks on Piccolo-80/128 require computational complexities of 2 and 2, respectively. The attack on a 29-round ...

متن کامل

Biclique Cryptanalysis of the Block Cipher SQUARE

SQUARE, an 8-round substitution-permutation block cipher, is considered as the predecessor of the AES. In this paper, inspired from the recent biclique attack on the AES [5], we present the first single-key attack on full SQUARE. First, we introduce a biclique for 3 rounds of SQUARE using the independent related-key differentials. Then, we present an attack on the full round of this cipher with...

متن کامل

Biclique cryptanalysis of the full-round KLEIN block cipher

In this paper we present a biclique attack on the newly proposed block cipher KLEIN-64. We first introduce some weaknesses of the diffusion layer and key schedule of this algorithm. Then we exploit them to present a full round attack on KLEIN-64 using an asymmetric biclique. The (worst case) computations and data complexity of this attack are 2 and 2, respectively. A modified version of this at...

متن کامل

Two Kinds of Biclique Attacks on Lightweight Block Cipher PRINCE

Inspired by the paper [10], using better differential characteristics in the biclique construction, we give another balanced biclique attack on full rounds PRINCE with the lower complexity in this paper. Our balanced biclique attack has 62.67 2 computational complexity and 32 2 data complexity. Furthermore, we first illustrate a star-based biclique attack on full rounds PRINCE cipher in this pa...

متن کامل

A Novel Architecture for Lightweight Block Cipher, Piccolo

Security and privacy are going to be the key factors for the deployment of new applications, since people will only accept these deployments if these are based on secure, trustworthy and privacy-preserving infra-structures. Cryptography plays a major role in the security of data transmission and the development of computing technology imposes stronger requirements on the cryptography schemes. L...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2017

ISSN: 1939-0114,1939-0122

DOI: 10.1155/2017/7589306