Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jeong, Kitae | - |
dc.contributor.author | Kang, HyungChul | - |
dc.contributor.author | Lee, Changhoon | - |
dc.contributor.author | Sung, Jaechul | - |
dc.contributor.author | Hong, Seokhie | - |
dc.contributor.author | Lim, Jong In | - |
dc.date.accessioned | 2021-09-04T14:48:42Z | - |
dc.date.available | 2021-09-04T14:48:42Z | - |
dc.date.created | 2021-06-16 | - |
dc.date.issued | 2015-07 | - |
dc.identifier.issn | 1936-6442 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/93149 | - |
dc.description.abstract | In this paper, we evaluate the security of lightweight block ciphers mCrypton and LED against biclique cryptanalysis. In cases of mCryton-64/96/128, our attacks require computational complexities of and , respectively. These results are the first known biclique cryptanalytic results on mCrypton. The attack on a 29-round reduced LED-64 needs 29-round reduced LED-64 encryptions. In the cases of LED-80/96/128, we propose the attacks on two versions. First, to recover the secret key of 45-round reduced LED-80/96/128, our attacks require computational complexities of and , respectively. To attack the full version, we require computational complexities of and , respectively. However, in these cases, we need the full codebook. These results are superior to known biclique cryptanalytic results on LED. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.title | Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hong, Seokhie | - |
dc.contributor.affiliatedAuthor | Lim, Jong In | - |
dc.identifier.doi | 10.1007/s12083-013-0208-4 | - |
dc.identifier.scopusid | 2-s2.0-84934952272 | - |
dc.identifier.wosid | 000356580800018 | - |
dc.identifier.bibliographicCitation | PEER-TO-PEER NETWORKING AND APPLICATIONS, v.8, no.4, pp.716 - 732 | - |
dc.relation.isPartOf | PEER-TO-PEER NETWORKING AND APPLICATIONS | - |
dc.citation.title | PEER-TO-PEER NETWORKING AND APPLICATIONS | - |
dc.citation.volume | 8 | - |
dc.citation.number | 4 | - |
dc.citation.startPage | 716 | - |
dc.citation.endPage | 732 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | Block cipher | - |
dc.subject.keywordAuthor | mCrypton | - |
dc.subject.keywordAuthor | LED | - |
dc.subject.keywordAuthor | Biclique | - |
dc.subject.keywordAuthor | Cryptanalysis | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.