Linear (Hull) and algebraic cryptanalysis of the block cipher PRESENT

49Citations
Citations of this article
46Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The contributions of this paper include the first linear hull and a revisit of the algebraic cryptanalysis of reduced-round variants of the block cipher PRESENT, under known-plaintext and ciphertext-only settings. We introduce a pure algebraic cryptanalysis of 5-round PRESENT and in one of our attacks we recover half of the bits of the key in less than three minutes using an ordinary desktop PC. The PRESENT block cipher is a design by Bogdanov et al., announced in CHES 2007 and aimed at RFID tags and sensor networks. For our linear attacks, we can attack 25-round PRESENT with the whole code book, 296.68 25-round PRESENT encryptions, 240 blocks of memory and 0.61 success rate. Further we can extend the linear attack to 26-round with small success rate. As a further contribution of this paper we computed linear hulls in practice for the original PRESENT cipher, which corroborated and even improved on the predicted bias (and the corresponding attack complexities) of conventional linear relations based on a single linear trail. © 2009 Springer-Verlag.

Cite

CITATION STYLE

APA

Nakahara, J., Sepehrdad, P., Zhang, B., & Wang, M. (2009). Linear (Hull) and algebraic cryptanalysis of the block cipher PRESENT. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5888 LNCS, pp. 58–75). https://doi.org/10.1007/978-3-642-10433-6_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free