In this paper, we propose an improved integral attack against round-reduced PRESENT-80. First, we find a new 7-round integral distinguisher by analyzing the algebraic degree of PRESENT. Then, we propose an algebraic method to recover the master key by solving a system of linear equations which are extracted from the last three rounds of the cipher. Using this method, we can attack 10-round PRESENT-80 with time complexity 227.6 and data complexity 227, and 12-round PRESENT-80 with time complexity 266 and data complexity 264. Moreover, a key partition technique is proposed to gain one more round such that we could attack 11-round PRESENT-80 with time complexity 258 and data complexity 248, and 13-round PRESENT-80 with time complexity 274 and data complexity 264.
CITATION STYLE
Wang, S., Xiang, Z., Zeng, X., & Zhang, S. (2019). Improved integral attacks on PRESENT-80. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11449 LNCS, pp. 163–182). Springer Verlag. https://doi.org/10.1007/978-3-030-14234-6_9
Mendeley helps you to discover research relevant for your work.