Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Paper 2015/393

Biclique cryptanalysis of MIBS-80 and PRESENT-80

Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, and Mohsen Shakiba

Abstract

In this paper we present the first biclique cryptanalysis of MIBS block cipher and a new biclique cryptanalysis of PRESENT block cipher. These attacks are performed on full-round MIBS-80 and full-round PRESENT-80. Attack on MIBS- 80 uses matching without matrix method and has a data complexity upper bounded by $2^{52}$ chosen plaintext where it reduced security of this cipher about 1 bit. Attack on PRESENT-80 has a data complexity of at most $2^{22}$ chosen plaintexts and computational complexity of $2^{79.37}$ encryptions that both complexities are lower than other cryptanalyses of PRESENT-80 so far.

Metadata
Available format(s)
PDF
Publication info
Preprint.
Keywords
Biclique cryptanalysisMIBSPRESENTBlock Cipher
Contact author(s)
mh faghihi @ ec iut ac ir
History
2015-04-29: received
Short URL
https://ia.cr/2015/393
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/393,
      author = {Mohammad Hossein Faghihi Sereshgi and Mohammad Dakhilalian and Mohsen Shakiba},
      title = {Biclique cryptanalysis of {MIBS}-80 and {PRESENT}-80},
      howpublished = {Cryptology {ePrint} Archive, Paper 2015/393},
      year = {2015},
      url = {https://eprint.iacr.org/2015/393}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.