The resistance of PRESENT-80 against related-key differential attacks


Autoria(s): Emami, Sareh; Ling, San; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huzxiong
Data(s)

2014

Resumo

We examine the security of the 64-bit lightweight block cipher PRESENT-80 against related-key differential attacks. With a computer search we are able to prove that for any related-key differential characteristic on full-round PRESENT-80, the probability of the characteristic only in the 64-bit state is not higher than 2−64. To overcome the exponential (in the state and key sizes) computational complexity of the search we use truncated differences, however as the key schedule is not nibble oriented, we switch to actual differences and apply early abort techniques to prune the tree-based search. With a new method called extended split approach we are able to make the whole search feasible and we implement and run it in real time. Our approach targets the PRESENT-80 cipher however,with small modifications can be reused for other lightweight ciphers as well.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/69322/

Publicador

Springer

Relação

http://eprints.qut.edu.au/69322/2/Pieprzyk_authors_draft.pdf

DOI:10.1007/s12095-013-0096-8

Emami, Sareh, Ling, San, Nikolić, Ivica, Pieprzyk, Josef, & Wang, Huzxiong (2014) The resistance of PRESENT-80 against related-key differential attacks. Cryptography and Communications, 16(3), pp. 171-187.

Direitos

Copyright 2013 Springer Science+Business Media New York

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Palavras-Chave #080000 INFORMATION AND COMPUTING SCIENCES #PRESENT #Related-key differentials #Automatic search #Tool
Tipo

Journal Article