Skip to main content
Log in

Biclique cryptanalysis of PRESENT-80 and PRESENT-128

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

In this paper, we evaluate the security of lightweight block ciphers PRESENT-80 and PRESENT-128 applicable to hybrid information systems against biclique cryptanalysis. To recover the secret key of PRESENT-80/128, our attacks require \(2^{79.76}\) full PRESENT-80 encryptions and \(2^{127.91}\) full PRESENT-128 encryptions, respectively. These results are superior to known biclique cryptanalytic results on them.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Abed F, Forler C, List E, Lucks S, Wenzel J (2012) Biclique cryptanalysis of the PRESENT and LED lightweight ciphers. Cryptology ePrint Archive, Report 2012/591

  2. Bogdanov A, Khovratovich D, Rechberger C (2011) Biclique cryptanalysis of the full AES. In: ASIACRYPT 2011. LNCS, vol 7073. IACR, Lyon, pp 344–371

  3. Bogdanov A, Knudsen L, Leander G, Paar C, Poschmann A, Robshaw M, Seurin Y, Vikkelsoe C (2007) PRESENT: an ultra-lightweight block cipher. In: CHES 2007. LNCS, vol 4727. Springer, Berlin, pp 450–466

  4. Chen S (2012) Biclique attack of the full ARIA-256. Cryptology ePrint Archive, Report 2012/011

  5. Jeong K, Kang H, Lee C, Sung J, Hong S, Lim J (2013) Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis. Peer-to-peer networking and applications. Springer, USA

  6. Çoban M, Karakoç F, Biztaş Ö (2012) Biclique Cryptanalysis of TWINE. Cryptology ePrint Archive, Report 2012/422

  7. Hong D, Koo B, Kwon D (2012) Biclique attack on the full HIGHT. In: ICISC 2011. LNCS, vol 7259. Springer, Berlin, pp 365–374

  8. Khovratovich D, Leurent G, Rechberger C (2012) Narrow-Bicliques: cryptanalysis of Full IDEA. In: EUROCRYPT 2012. LNCS, vol 7237. IACR, Lyon, pp 392–410

  9. Lee S, Kim D, Yi J, Ro W (2013) An efficient block cipher implementation on many-core graphics processing units. J Inf Process Syst 8(1):159–174

    Article  Google Scholar 

  10. Nakahara Jr J, Sepehrdad P, Zhang B, Wang M (2009) Linear (Hull) and algebraic cryptanalysis of the block cipher PRESENT. In: CANS 2009. LNCS, vol 5888. Springer, Berlin, pp 58–75

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Changhoon Lee.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lee, C. Biclique cryptanalysis of PRESENT-80 and PRESENT-128. J Supercomput 70, 95–103 (2014). https://doi.org/10.1007/s11227-014-1103-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-014-1103-3

Keywords

Navigation