Paper 2010/407
Flaws in Differential Cryptanalysis of Reduced Round PRESENT
Manoj Kumar, Pratibha Yadav, and Meena Kumari
Abstract
In this paper, we have presented flaws in differential cryptanalysis of reduced round variant of PRESENT given by M.Wang in [3] [4] for 80 bits key length and we have shown that it is not possible to recover 32 subkey bits by differential cryptanalysis of 16-round PRESENT as claimed in [3] [4].We have also shown that at the most 30 subkey bits can be recovered by the attack given in [4] after some modifications in the algorithm presented in [3][4].
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. Unknown where it was published
- Contact author(s)
- mktalyan @ yahoo com
- History
- 2010-07-21: received
- Short URL
- https://ia.cr/2010/407
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2010/407, author = {Manoj Kumar and Pratibha Yadav and Meena Kumari}, title = {Flaws in Differential Cryptanalysis of Reduced Round {PRESENT}}, howpublished = {Cryptology {ePrint} Archive, Paper 2010/407}, year = {2010}, url = {https://eprint.iacr.org/2010/407} }