Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis

Full metadata record
DC Field Value Language
dc.contributor.authorJeong, Kitae-
dc.contributor.authorKang, HyungChul-
dc.contributor.authorLee, Changhoon-
dc.contributor.authorSung, Jaechul-
dc.contributor.authorHong, Seokhie-
dc.contributor.authorLim, Jong In-
dc.date.accessioned2021-09-04T14:48:42Z-
dc.date.available2021-09-04T14:48:42Z-
dc.date.created2021-06-16-
dc.date.issued2015-07-
dc.identifier.issn1936-6442-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/93149-
dc.description.abstractIn this paper, we evaluate the security of lightweight block ciphers mCrypton and LED against biclique cryptanalysis. In cases of mCryton-64/96/128, our attacks require computational complexities of and , respectively. These results are the first known biclique cryptanalytic results on mCrypton. The attack on a 29-round reduced LED-64 needs 29-round reduced LED-64 encryptions. In the cases of LED-80/96/128, we propose the attacks on two versions. First, to recover the secret key of 45-round reduced LED-80/96/128, our attacks require computational complexities of and , respectively. To attack the full version, we require computational complexities of and , respectively. However, in these cases, we need the full codebook. These results are superior to known biclique cryptanalytic results on LED.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherSPRINGER-
dc.titleWeakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis-
dc.typeArticle-
dc.contributor.affiliatedAuthorHong, Seokhie-
dc.contributor.affiliatedAuthorLim, Jong In-
dc.identifier.doi10.1007/s12083-013-0208-4-
dc.identifier.scopusid2-s2.0-84934952272-
dc.identifier.wosid000356580800018-
dc.identifier.bibliographicCitationPEER-TO-PEER NETWORKING AND APPLICATIONS, v.8, no.4, pp.716 - 732-
dc.relation.isPartOfPEER-TO-PEER NETWORKING AND APPLICATIONS-
dc.citation.titlePEER-TO-PEER NETWORKING AND APPLICATIONS-
dc.citation.volume8-
dc.citation.number4-
dc.citation.startPage716-
dc.citation.endPage732-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorBlock cipher-
dc.subject.keywordAuthormCrypton-
dc.subject.keywordAuthorLED-
dc.subject.keywordAuthorBiclique-
dc.subject.keywordAuthorCryptanalysis-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hong, Seok hie photo

Hong, Seok hie
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE