Paper 2010/407

Flaws in Differential Cryptanalysis of Reduced Round PRESENT

Manoj Kumar, Pratibha Yadav, and Meena Kumari

Abstract

In this paper, we have presented flaws in differential cryptanalysis of reduced round variant of PRESENT given by M.Wang in [3] [4] for 80 bits key length and we have shown that it is not possible to recover 32 subkey bits by differential cryptanalysis of 16-round PRESENT as claimed in [3] [4].We have also shown that at the most 30 subkey bits can be recovered by the attack given in [4] after some modifications in the algorithm presented in [3][4].

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Unknown where it was published
Contact author(s)
mktalyan @ yahoo com
History
2010-07-21: received
Short URL
https://ia.cr/2010/407
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2010/407,
      author = {Manoj Kumar and Pratibha Yadav and Meena Kumari},
      title = {Flaws in Differential Cryptanalysis of Reduced Round PRESENT},
      howpublished = {Cryptology ePrint Archive, Paper 2010/407},
      year = {2010},
      note = {\url{https://eprint.iacr.org/2010/407}},
      url = {https://eprint.iacr.org/2010/407}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.