Differential Analysis of the LED Block Cipher

  • Mendel F
  • Rijmen V
  • Toz D
  • et al.
N/ACitations
Citations of this article
32Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper, we present a security analysis of the lightweight block cipher LED proposed by Guo et al. at CHES 2011. Since the design of LED is very similar to the Even-Mansour scheme, we first review existing attacks on this scheme and extend them to related-key and relatedkey-cipher settings before we apply them to LED. We obtain results for 12 and 16 rounds (out of 32) for LED-64 and 16 and 24 rounds (out of 48) for LED-128. Furthermore, we present an observation on full LED in the related-key-cipher setting1. For all these attacks we need to find good differentials for one step (4 rounds) of LED. Therefore, we extend the study of plateau characteristics for AES-like structures from two rounds to four rounds when the key addition is replaced with a constant addition. We introduce an algorithm that can be used to find good differentials and right pairs for one step of LED. To be more precise, we can find more than 210 right pairs for one step of LED with complexity of 216 and memory requirement of 5 × 217. Moreover, a similar algorithm can also be used to find iterative characteristics for the LED. © International Association for Cryptologic Research 2012.

Cite

CITATION STYLE

APA

Mendel, F., Rijmen, V., Toz, D., & Varıcı, K. (2012). Differential Analysis of the LED Block Cipher (pp. 190–207). https://doi.org/10.1007/978-3-642-34961-4_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free