2009
DOI: 10.1007/978-3-642-10433-6_5
|View full text |Cite
|
Sign up to set email alerts
|

Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT

Abstract: Abstract. The contributions of this paper include the first linear hull and a revisit of the algebraic cryptanalysis of reduced-round variants of the block cipher PRESENT, under known-plaintext and ciphertextonly settings. We introduce a pure algebraic cryptanalysis of 5-round PRESENT and in one of our attacks we recover half of the bits of the key in less than three minutes using an ordinary desktop PC. The PRESENT block cipher is a design by Bogdanov et al., announced in CHES 2007 and aimed at RFID tags and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 51 publications
(31 citation statements)
references
References 25 publications
0
31
0
Order By: Relevance
“…The best published differential attacks are for 16 rounds of Present-80 [30] and 17 (and possibly up to 19) rounds [1] for Present-128. Results on linear cryptanalysis for up to 26 rounds are available in [12,26]. Bit-pattern based integral attacks [31] are successful up to seven rounds of Present.…”
Section: Block Ciphersmentioning
confidence: 99%
“…The best published differential attacks are for 16 rounds of Present-80 [30] and 17 (and possibly up to 19) rounds [1] for Present-128. Results on linear cryptanalysis for up to 26 rounds are available in [12,26]. Bit-pattern based integral attacks [31] are successful up to seven rounds of Present.…”
Section: Block Ciphersmentioning
confidence: 99%
“…Its original structure has attracted the attention of the community, and a large number of results on reduced versions have been published [38,16,39,35,2,34,17,27,32,5]. All these attacks need a large number of plaintext-ciphertext pairs, which in most cases reaches the full codebook.…”
Section: Brief Description Of Presentmentioning
confidence: 99%
“…Security PRESENT has attracted a lot of cryptanalytic attention because of very particular linear biases. The papers [42,12,13,36] study the linear behavior of PRESENT regarding multiple linear trails. This kind of cryptanalysis allows to mount multi-linear attacks on up to 27 rounds of PRESENT but using all the codebook.…”
Section: Desl and Desxl Desl And Desxl Are Two Lightweight Variants Omentioning
confidence: 99%