Improved integral attacks on PRESENT-80

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we propose an improved integral attack against round-reduced PRESENT-80. First, we find a new 7-round integral distinguisher by analyzing the algebraic degree of PRESENT. Then, we propose an algebraic method to recover the master key by solving a system of linear equations which are extracted from the last three rounds of the cipher. Using this method, we can attack 10-round PRESENT-80 with time complexity 227.6 and data complexity 227, and 12-round PRESENT-80 with time complexity 266 and data complexity 264. Moreover, a key partition technique is proposed to gain one more round such that we could attack 11-round PRESENT-80 with time complexity 258 and data complexity 248, and 13-round PRESENT-80 with time complexity 274 and data complexity 264.

Cite

CITATION STYLE

APA

Wang, S., Xiang, Z., Zeng, X., & Zhang, S. (2019). Improved integral attacks on PRESENT-80. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11449 LNCS, pp. 163–182). Springer Verlag. https://doi.org/10.1007/978-3-030-14234-6_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free