Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis
- Authors
- Jeong, Kitae; Kang, HyungChul; Lee, Changhoon; Sung, Jaechul; Hong, Seokhie; Lim, Jong In
- Issue Date
- 7월-2015
- Publisher
- SPRINGER
- Keywords
- Block cipher; mCrypton; LED; Biclique; Cryptanalysis
- Citation
- PEER-TO-PEER NETWORKING AND APPLICATIONS, v.8, no.4, pp.716 - 732
- Indexed
- SCIE
SCOPUS
- Journal Title
- PEER-TO-PEER NETWORKING AND APPLICATIONS
- Volume
- 8
- Number
- 4
- Start Page
- 716
- End Page
- 732
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/93149
- DOI
- 10.1007/s12083-013-0208-4
- ISSN
- 1936-6442
- Abstract
- In this paper, we evaluate the security of lightweight block ciphers mCrypton and LED against biclique cryptanalysis. In cases of mCryton-64/96/128, our attacks require computational complexities of and , respectively. These results are the first known biclique cryptanalytic results on mCrypton. The attack on a 29-round reduced LED-64 needs 29-round reduced LED-64 encryptions. In the cases of LED-80/96/128, we propose the attacks on two versions. First, to recover the secret key of 45-round reduced LED-80/96/128, our attacks require computational complexities of and , respectively. To attack the full version, we require computational complexities of and , respectively. However, in these cases, we need the full codebook. These results are superior to known biclique cryptanalytic results on LED.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.