Paper 2010/143

Small Scale Variants Of The Block Cipher PRESENT

Gregor Leander

Abstract

In this note we de¯ne small scale variants of the block cipher present [1]. The main reason for this is that the running time of some recent attacks (e.g. [2, 3]) remain unclear as they are based on heuristics that are hard or even impossible to verify in practice. Those attacks usually require the full code bock of present to be available and they work only if some independence assumptions hold in practice. While those assumptions are clearly wrong from a theoretical point of view, the impact on the running times of the attacks in question is not clear. With versions of present with smaller block size it might be possible to verify how those attacks scale for those versions and hopefully learn something about present itself.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
PRESENT
Contact author(s)
g leander @ mat dtu dk
History
2010-03-18: received
Short URL
https://ia.cr/2010/143
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2010/143,
      author = {Gregor Leander},
      title = {Small Scale Variants Of The Block Cipher PRESENT},
      howpublished = {Cryptology ePrint Archive, Paper 2010/143},
      year = {2010},
      note = {\url{https://eprint.iacr.org/2010/143}},
      url = {https://eprint.iacr.org/2010/143}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.