logo

SCIENCE CHINA Information Sciences, Volume 59, Issue 3: 032110(2016) https://doi.org/10.1007/s11432-015-5295-9

Key recovery attack for PRESENT using slender-set linear cryptanalysis

More info
  • ReceivedOct 30, 2015
  • AcceptedDec 10, 2015
  • PublishedJan 21, 2016

Abstract

There is no abstract available for this article.


Funded by

Foundation of Science and Technology on Information Assurance Laboratory(KJ-13-007)

national Natural Science Foundation of China(61402523)

national Natural Science Foundation of China(61272488)


Acknowledgment

Acknowledgments

This work was supported by national Natural Science Foundation of China (Grant Nos. 61272488, 61402523) and Foundation of Science and Technology on Information Assurance Laboratory (Grant No. KJ-13-007).


References

[1] Lim C, Korkishko T. mCrypton---a lightweight block cipher for security of low-cost RFID tags and sensors. In: Proceedings of 6th International Workshop on Information Security Applications, Jeju Island, 2005. 243--258. Google Scholar

[2] Hong D, Sung J, Hong S, et al. HIGHT: a new block cipher suitable for low-resource device. In: Proceedings of 8th International Workshop on Cryptographic Hardware and Embedded Systems, Yokohama, 2006. 46--59. Google Scholar

[3] Engels D, Saarinen M J, Schweitzer P, et al. The hummingbird-2 lightweight authenticated encryption algorithm. In: Proceedings of 7th International Conference on RFID Security and Privacy, Amherst, 2012. 19--31. Google Scholar

[4] Standaert F X, Piret G, Gershenfeld N, et al. SEA: a scalable encryption algorithm for small embedded applications. In: Proceedings of 7th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications, Tarragona, 2006. 222--236. Google Scholar

[5] Leander G, Paar C, Poschmann A, et al. New lightweight DES variants. In: Proceedings of 14th International Workshop on Fast Software Encryption, Luxembourg, 2007. 196--210. Google Scholar

[6] Cannière C, Dunkelman O, Kne\v{z}ević M. KATAN and KTANTAN---a family of small and efficient hardware-oriented block ciphers. In: Proceedings of 11th International Workshop on Cryptographic Hardware and Embedded Systems, Lausanne, 2009. 272--288. Google Scholar

[7] Izadi M, Sadeghiyan B, Sadeghian S, et al. MIBS: a new lightweight block cipher. In: Proceedings of 8th International Conference on Cryptology and Network Security, Kanazawa, 2009. 334--348. Google Scholar

[8] Guo J, Peyrin T, Poschmann A, et al. The LED block cipher. In: Proceedings of 13th International Workshop on Cryptographic Hardware and Embedded Systems, Nara, 2011. 326--341. Google Scholar

[9] Bogdanov A, Knudsen L R, Leander G, et al. PRESENT: an ultra-lightweight block cipher. In: Proceedings of 9th International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, 2007. 450--466. Google Scholar

[10] Wang M. Differential cryptanalysis of reduced-round PRESENT. In: Proceedings of 1st International Conference on Cryptology in Africa, Casablanca, 2008. 40--49. Google Scholar

[11] Collard B, Standaert F X. A statistical saturation attack against the block cipher PRESENT. In: Proceedings of the Cryptographers' Track at the RSA Conference, San Francisco, 2009. 195--210. Google Scholar

[12] Nakahara J, Sepehrdad P, Zhang B, et al. Linear (hull) and algebraic cryptanalysis of the block cipher PRESENT. In: Proceedings of 8th International Conference on Cryptology and Network Security, Kanazawa, 2009. 58--75. Google Scholar

[13] Ohkuma K. Weak keys of reduced-round PRESENT for linear cryptanalysis. In: Proceedings of 16th Annual International Workshop on Selected Areas in Cryptography, Calgary, 2009. 249--265. Google Scholar

[14] Blondeau C, Gérard B. Multiple differential cryptanalysis: theory and practice. In: Proceedings of 18th International Workshop on Fast Software Encryption, Lyngby, 2011. 35--54. Google Scholar

[15] Blondeau C, Gérard B. Multiple differential cryptanalysis: theory and practice (corrected). Cryptology ePrint Archive. Report 2011/115, 2011. Google Scholar

[16] Blondeau C, Gérard B, Nyberg K. Multiple differential cryptanalysis using LLR and $\chi ^2 $ statistics. In: Proceedings of 8th International Conference on Security and Cryptography for Networks, Amalfi, 2012. 343--360. Google Scholar

[17] Wang M, Sun Y, Tischhauser E, et al. A model for structure attacks, with applications to PRESENT and Serpent. In: Proceedings of 19th International Workshop on Fast Software Encryption, Washington DC, 2012. 49--68. Google Scholar

[18] Cho J. Linear cryptanalysis of reduced-round PRESENT. In: Proceedings of the Cryptographers' Track at the RSA Conference, San Francisco, 2010. 302--317. Google Scholar

[19] Liu G Q, Jin C H. Designs Codes Cryptogr, 2015, 76: 385-408 CrossRef Google Scholar

[20] Matsui M. The first experimental cryptanalysis of the data encryption standard. In: Proceedings of 14th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, 1994. 1--11. Google Scholar

[21] Matsui M. Linear cryptanalysis method for DES cipher. In: Proceedings of Workshop on the Theory and Application of Cryptographic Techniques, Lofthus, 1994. 386--397. Google Scholar

[22] Borghoff J, Knudsen L, Leander G, et al. Cryptanalysis of PRESENT-like ciphers with secret S-boxes. In: Proceedings of 18th International Conference on Fast Software Encryption, Lyngby, 2011. 270--289. Google Scholar

[23] Borghoff J, Knudsen L, Leander G, et al. J Cryptol, 2013, 26: 11-38 CrossRef Google Scholar

[24] Liu G Q, Jin C H, Qi C D. Improved slender-set linear cryptanalysis. Cryptology ePrint Archive, Report 2014/100, 2014. Google Scholar

[25] Liu G Q, Jin C H, Qi C D. Improved slender-set linear cryptanalysis. In: Proceedings of 21st International Workshop on Fast Software Encryption, London, 2014. 431--450. Google Scholar

[26] Sun X R, Lai X J. The key-dependent attack on block ciphers. In: Proceedings of 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, 2009. 19--36. Google Scholar

[27] Selcuk A A. J Cryptol, 2008, 21: 131-147 CrossRef Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1