Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-642-02620-1_7guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT

Published: 22 June 2009 Publication History

Abstract

Design and analysis of lightweight block ciphers have become more popular due to the fact that the future use of block ciphers in ubiquitous devices is generally assumed to be extensive. In this respect, several lightweight block ciphers are designed, of which <Emphasis Type="SmallCaps">Present</Emphasis> and <Emphasis Type="SmallCaps">Hight</Emphasis> are two recently proposed ones by Bogdanov <em>et al.</em> and Hong <em>et al.</em> respectively. In this paper, we propose new attacks on <Emphasis Type="SmallCaps">Present</Emphasis> and <Emphasis Type="SmallCaps">Hight</Emphasis> . Firstly, we present the first related-key cryptanalysis of 128-bit keyed <Emphasis Type="SmallCaps">Present</Emphasis> by introducing 17-round related-key rectangle attack with time complexity approximately 2104 memory accesses. Moreover, we further analyze the resistance of <Emphasis Type="SmallCaps">Hight</Emphasis> against impossible differential attacks by mounting new 26-round impossible differential and 31-round related-key impossible differential attacks where the former requires time complexity of 2119.53 reduced round <Emphasis Type="SmallCaps">Hight</Emphasis> evaluations and the latter is slightly better than exhaustive search.

References

[1]
Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, New York (2002).
[2]
Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B., Lee, C., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J., Chee, S.: HIGHT: A New Block Cipher Suitable for Low-Resource Device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 46-59. Springer, Heidelberg (2006).
[3]
South Korea Telecommunications Technology Associations (TTA). 64-bit Block Cipher HIGHT. Standardization Number TTAS.KO-12.0040, December 27 (2006).
[4]
Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450-466. Springer, Heidelberg (2007).
[5]
Lim, C.H., Korkishko, T.: mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 243-258. Springer, Heidelberg (2006).
[6]
Standaert, F.-X., Piret, G., Gershenfeld, N., Quisquater, J.-J.: SEA: A Scalable Encryption Algorithm for Small Embedded Applications. In: Domingo-Ferrer, J., Posegga, J., Schreckling, D. (eds.) CARDIS 2006. LNCS, vol. 3928, pp. 222-236. Springer, Heidelberg (2006).
[7]
Robshaw, M.J.B.: Searching for Compact Algorithms: CGEN. In: Nguyên, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 37-49. Springer, Heidelberg (2006).
[8]
Leander, G., Paar, C., Poschmann, A., Schramm, K.: New Lightweight DES Variants. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 196-210. Springer, Heidelberg (2007).
[9]
Wheeler, D.J., Needham, R.M.: TEA, a Tiny Encryption Algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 363-366. Springer, Heidelberg (1995).
[10]
Wheeler, D.J., Needham, R.M.: TEA Extensions (October 1997).
[11]
The eSTREAM Portfolio. The eSTREAM Project (September 2008), http://www.ecrypt.eu.org/stream/
[12]
Wang, M.: Differential Cryptanalysis of Reduced-Round PRESENT. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 40-49. Springer, Heidelberg (2008).
[13]
Albrecht, M., Cid, C.: Algebraic Techniques in Differential Cryptanalysis. To appear in proceedings of FSE (2009).
[14]
Z'aba, M.R., Raddum, H., Henricksen, M., Dawson, E.: Bit-Pattern Based Integral Attack. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 363-381. Springer, Heidelberg (2008).
[15]
Collard, B., Standaert, F.-X.: A Statistical Saturation Attack against the Block Cipher PRESENT. To appear in proceedings of CT-RSA (2009).
[16]
Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen {26}, pp. 245-259.
[17]
Biham, E.: New Types of Cryptanalytic Attacks Using Related Keys. Journal of Cryptology 7(4), 229-246 (1994).
[18]
Lu, J.: Cryptanalysis of Block Ciphers. PhD thesis, Royal Holloway, University of London, England (July 2008).
[19]
Lu, J.: Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 11-26. Springer, Heidelberg (2007).
[20]
Biham, E., Dunkelman, O., Keller, N.: Related-Key Boomerang and Rectangle Attacks. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 507-525. Springer, Heidelberg (2005).
[21]
Biham, E., Dunkelman, O., Keller, N.: New Combined Attacks on Block Ciphers. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 126-144. Springer, Heidelberg (2005).
[22]
Biham, E., Dunkelman, O., Keller, N.: The Rectangle Attack - Rectangling the Serpent. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 340- 357. Springer, Heidelberg (2001).
[23]
Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. Journal of Cryptology 18(4), 291-311 (2005).
[24]
Biham, E., Biryukov, A., Shamir, A.: Miss in the Middle Attacks on IDEA and Khufu. In: Knudsen {26}, pp. 124-138.
[25]
Dunkelman, O.: Techniques for Cryptanalysis of Block Ciphers. PhD thesis, Technion, Israel (February 2006).
[26]
Knudsen, L.R. (ed.): FSE 1999. LNCS, vol. 1636. Springer, Heidelberg (1999).

Cited By

View all
  • (2024)Improved Linear Key Recovery Attacks on PRESENTIEEE Transactions on Information Theory10.1109/TIT.2024.347470170:12(9195-9213)Online publication date: 7-Oct-2024
  • (2020)Design Space Exploration for Ultra-Low-Energy and Secure IoT MCUsACM Transactions on Embedded Computing Systems10.1145/338444619:3(1-34)Online publication date: 18-May-2020
  • (2020)SVHF: A Lightweight Stream Cipher Based on Feistel and OFBSecurity, Privacy, and Anonymity in Computation, Communication, and Storage10.1007/978-3-030-68884-4_42(506-518)Online publication date: 18-Dec-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
ACISP '09: Proceedings of the 14th Australasian Conference on Information Security and Privacy
June 2009
468 pages
ISBN:9783642026195
  • Editors:
  • Colin Boyd,
  • Juan González Nieto

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 22 June 2009

Author Tags

  1. Hight
  2. Impossible Differential Attack
  3. Present
  4. Rectangle Attack
  5. Related-Key Attack

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 29 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Improved Linear Key Recovery Attacks on PRESENTIEEE Transactions on Information Theory10.1109/TIT.2024.347470170:12(9195-9213)Online publication date: 7-Oct-2024
  • (2020)Design Space Exploration for Ultra-Low-Energy and Secure IoT MCUsACM Transactions on Embedded Computing Systems10.1145/338444619:3(1-34)Online publication date: 18-May-2020
  • (2020)SVHF: A Lightweight Stream Cipher Based on Feistel and OFBSecurity, Privacy, and Anonymity in Computation, Communication, and Storage10.1007/978-3-030-68884-4_42(506-518)Online publication date: 18-Dec-2020
  • (2017)Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block CipherSecurity and Communication Networks10.1155/2017/80517282017Online publication date: 1-Jan-2017
  • (2016)Repeated Differential Properties of PRESENT Key SchedulesProceedings of the 4th International Conference on Information and Network Security10.1145/3026724.3026727(24-28)Online publication date: 28-Dec-2016
  • (2015)AKFInformation Processing Letters10.1016/j.ipl.2014.10.010115:2(359-367)Online publication date: 1-Feb-2015
  • (2015)Accurate Estimation of the Full Differential Distribution for General Feistel StructuresRevised Selected Papers of the 11th International Conference on Information Security and Cryptology - Volume 958910.1007/978-3-319-38898-4_7(108-124)Online publication date: 1-Nov-2015
  • (2014)Multidimensional zero-correlation attacks on lightweight block cipher HIGHTInformation Processing Letters10.1016/j.ipl.2014.01.007114:6(322-330)Online publication date: 1-Jun-2014
  • (2014)The resistance of PRESENT-80 against related-key differential attacksCryptography and Communications10.1007/s12095-013-0096-86:3(171-187)Online publication date: 1-Sep-2014
  • (2012)Multi-differential cryptanalysis on reduced DM-PRESENT-80Proceedings of the 15th international conference on Information Security and Cryptology10.1007/978-3-642-37682-5_25(352-367)Online publication date: 28-Nov-2012
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media