مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

551
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

188
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity

Pages

  57-74

Abstract

 In the biclique attack, a shorter biclique usually results in less data complexity, but at the expense of more computational complexity. The Early Abort Technique can be used in Partial Matching part of the biclique attack in order to slightly reduce the computations. In this paper, we make use of this technique, but instead of slight improvement in the computational complexity, we keep the amount of this complexity the same and reduce the data complexity enormously by a shorter biclique. With this approach, we analyze full-round LBlock, and also LBlock with modi ed key schedule (which was designed to resist biclique attack) both with data complexity 212, while the data complexity of the best biclique attack on the former was 252 and for the latter there is no attack on the full-round cipher, so far. Then we propose a new key schedule that is more resistant against Biclique Cryptanalysis, though the low di usion of the cipher makes it vulnerable to this attack regardless of the strength of the key schedule. Also using this method, we analyze TWINE-80 with 212 data complexity. The lowest data complexity for the prior attack on the TWINE-80 was 260. In all the attacks presented in this paper, the computational complexities are slightly improved in comparison to the existing attacks.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    Ahmadi, Siavash, AHMADIAN, ZAHRA, MOHAJERI, JAVAD, & AREF, MOHAMMAD REZA. (2019). Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity. THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 11(1 ), 57-74. SID. https://sid.ir/paper/241802/en

    Vancouver: Copy

    Ahmadi Siavash, AHMADIAN ZAHRA, MOHAJERI JAVAD, AREF MOHAMMAD REZA. Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity. THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY[Internet]. 2019;11(1 ):57-74. Available from: https://sid.ir/paper/241802/en

    IEEE: Copy

    Siavash Ahmadi, ZAHRA AHMADIAN, JAVAD MOHAJERI, and MOHAMMAD REZA AREF, “Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity,” THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, vol. 11, no. 1 , pp. 57–74, 2019, [Online]. Available: https://sid.ir/paper/241802/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button