Reference Hub1
Security Analysis of Cipher ICEBERG against Bit-pattern Based Integral Attack

Security Analysis of Cipher ICEBERG against Bit-pattern Based Integral Attack

Yuechuan Wei, Yisheng Rong, Xu An Wang
Copyright: © 2016 |Volume: 12 |Issue: 2 |Pages: 12
ISSN: 1548-3908|EISSN: 1548-3916|EISBN13: 9781466689213|DOI: 10.4018/IJTHI.2016040105
Cite Article Cite Article

MLA

Wei, Yuechuan, et al. "Security Analysis of Cipher ICEBERG against Bit-pattern Based Integral Attack." IJTHI vol.12, no.2 2016: pp.60-71. http://doi.org/10.4018/IJTHI.2016040105

APA

Wei, Y., Rong, Y., & Wang, X. A. (2016). Security Analysis of Cipher ICEBERG against Bit-pattern Based Integral Attack. International Journal of Technology and Human Interaction (IJTHI), 12(2), 60-71. http://doi.org/10.4018/IJTHI.2016040105

Chicago

Wei, Yuechuan, Yisheng Rong, and Xu An Wang. "Security Analysis of Cipher ICEBERG against Bit-pattern Based Integral Attack," International Journal of Technology and Human Interaction (IJTHI) 12, no.2: 60-71. http://doi.org/10.4018/IJTHI.2016040105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Significant progress in the development of lightweight symmetric cryptographic primitives has been made in recent years. Security of ciphers against current cryptanalysis methods should be carefully evaluated. Integral attack is one of the most effective attacks against block ciphers. However, traditional integral attack based on byte or word is not available for a bit-oriented cipher. Bit-pattern based integral attack technique, introduced by Z'aba et al. addresses this issue to some extent. In this paper, bit-pattern based integral attack is applied to ICEBERG—a lightweight block cipher efficient in reconfigurable hard-ware. By tracing the propagation of the plaintext structure at bit-level, the balance property is obtained and then key guesses are verified. The result shows that 3, 4 and 5 rounds ICEBERG are not immune to this attack. All attacks presented in this paper manage to recover the full subkeys of the final round.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.