Paper 2012/621

Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED

Kitae Jeong, HyungChul Kang, Changhoon Lee, Jaechul Sung, and Seokhie Hong

Abstract

In this paper, we evaluate the security of lightweight block ciphers PRESENT, Piccolo and LED against biclique cryptanalysis. To recover the secret key of PRESENT-80/128, our attacks require $2^{79.76}$ full PRESENT-80 encryptions and $2^{127.91}$ full PRESENT-128 encryptions, respectively. Our attacks on Piccolo-80/128 require computational complexities of $2^{79.13}$ and $2^{127.35}$, respectively. The attack on a $29$-round reduced LED-64 needs $2^{63.58}$ 29-round reduced LED-64 encryptions. In the cases of LED-80/96/128, we propose the attacks on two versions. First, to recover the secret key of $45$-round reduced LED-80/96/128, our attacks require computational complexities of $2^{79.45}, 2^{95.45}$ and $2^{127.45}$, respectively. To attack the full version, we require computational complexities of $2^{79.37}, 2^{95.37}$ and $2^{127.37}$, respectively. However, in these cases, we need the full codebook. These results are superior to known biclique cryptanalytic results on them.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
Block cipherPRESENTPiccoloLEDBicliqueCryptanalysis
Contact author(s)
kite jeong @ gmail com
History
2012-11-08: revised
2012-11-05: received
See all versions
Short URL
https://ia.cr/2012/621
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/621,
      author = {Kitae Jeong and HyungChul Kang and Changhoon Lee and Jaechul Sung and Seokhie Hong},
      title = {Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED},
      howpublished = {Cryptology ePrint Archive, Paper 2012/621},
      year = {2012},
      note = {\url{https://eprint.iacr.org/2012/621}},
      url = {https://eprint.iacr.org/2012/621}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.