Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis

Kitae Jeong, Hyung Chul Kang, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jong In Lim

Research output: Contribution to journalArticlepeer-review

14 Citations (Scopus)

Abstract

In this paper, we evaluate the security of lightweight block ciphers mCrypton and LED against biclique cryptanalysis. In cases of mCryton-64/96/128, our attacks require computational complexities of $2^{63.18}, 2^{94.81}$ and $2^{126.56}$, respectively. These results are the first known biclique cryptanalytic results on mCrypton. The attack on a 29-round reduced LED-64 needs $2^{63.58}$ 29-round reduced LED-64 encryptions. In the cases of LED-80/96/128, we propose the attacks on two versions. First, to recover the secret key of 45-round reduced LED-80/96/128, our attacks require computational complexities of $2^{79.45}, 2^{95.45}$ and $2^{127.45}$, respectively. To attack the full version, we require computational complexities of $2^{79.37}, 2^{95.37}$ and $2^{127.37}$, respectively. However, in these cases, we need the full codebook. These results are superior to known biclique cryptanalytic results on LED.

Original languageEnglish
Pages (from-to)716-732
Number of pages17
JournalPeer-to-Peer Networking and Applications
Volume8
Issue number4
DOIs
Publication statusPublished - 2015 Jul 20

Bibliographical note

Funding Information:
This work was supported by a Korea University Grant for Kitae Jeong. Also this research was supported by the MKE(The Ministry of Knowledge Economy), Korea, under the ITRC(Information Technology Research Center) support program (NIPA-2013-H0301-13-3007) supervised by the NIPA(National IT Industry Promotion Agency).

Publisher Copyright:
© 2013, Springer Science+Business Media New York.

Keywords

  • Biclique
  • Block cipher
  • Cryptanalysis
  • LED
  • mCrypton

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis'. Together they form a unique fingerprint.

Cite this