Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis

Kitae Jeong, Hyung Chul Kang, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jong In Lim

Research output: Contribution to journalArticle

9 Citations (Scopus)

Abstract

In this paper, we evaluate the security of lightweight block ciphers mCrypton and LED against biclique cryptanalysis. In cases of mCryton-64/96/128, our attacks require computational complexities of $2^{63.18}, 2^{94.81}$ and $2^{126.56}$, respectively. These results are the first known biclique cryptanalytic results on mCrypton. The attack on a 29-round reduced LED-64 needs $2^{63.58}$ 29-round reduced LED-64 encryptions. In the cases of LED-80/96/128, we propose the attacks on two versions. First, to recover the secret key of 45-round reduced LED-80/96/128, our attacks require computational complexities of $2^{79.45}, 2^{95.45}$ and $2^{127.45}$, respectively. To attack the full version, we require computational complexities of $2^{79.37}, 2^{95.37}$ and $2^{127.37}$, respectively. However, in these cases, we need the full codebook. These results are superior to known biclique cryptanalytic results on LED.

Original languageEnglish
Pages (from-to)716-732
Number of pages17
JournalPeer-to-Peer Networking and Applications
Volume8
Issue number4
DOIs
Publication statusPublished - 2015 Jul 20

Fingerprint

Light emitting diodes
Computational complexity
Cryptography

Keywords

  • Biclique
  • Block cipher
  • Cryptanalysis
  • LED
  • mCrypton

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software

Cite this

Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis. / Jeong, Kitae; Kang, Hyung Chul; Lee, Changhoon; Sung, Jaechul; Hong, Seokhie; Lim, Jong In.

In: Peer-to-Peer Networking and Applications, Vol. 8, No. 4, 20.07.2015, p. 716-732.

Research output: Contribution to journalArticle

Jeong, Kitae ; Kang, Hyung Chul ; Lee, Changhoon ; Sung, Jaechul ; Hong, Seokhie ; Lim, Jong In. / Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis. In: Peer-to-Peer Networking and Applications. 2015 ; Vol. 8, No. 4. pp. 716-732.
@article{ca77864c9f8f485ca6f6df9e16efbb98,
title = "Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis",
abstract = "In this paper, we evaluate the security of lightweight block ciphers mCrypton and LED against biclique cryptanalysis. In cases of mCryton-64/96/128, our attacks require computational complexities of $2^{63.18}, 2^{94.81}$ and $2^{126.56}$, respectively. These results are the first known biclique cryptanalytic results on mCrypton. The attack on a 29-round reduced LED-64 needs $2^{63.58}$ 29-round reduced LED-64 encryptions. In the cases of LED-80/96/128, we propose the attacks on two versions. First, to recover the secret key of 45-round reduced LED-80/96/128, our attacks require computational complexities of $2^{79.45}, 2^{95.45}$ and $2^{127.45}$, respectively. To attack the full version, we require computational complexities of $2^{79.37}, 2^{95.37}$ and $2^{127.37}$, respectively. However, in these cases, we need the full codebook. These results are superior to known biclique cryptanalytic results on LED.",
keywords = "Biclique, Block cipher, Cryptanalysis, LED, mCrypton",
author = "Kitae Jeong and Kang, {Hyung Chul} and Changhoon Lee and Jaechul Sung and Seokhie Hong and Lim, {Jong In}",
year = "2015",
month = "7",
day = "20",
doi = "10.1007/s12083-013-0208-4",
language = "English",
volume = "8",
pages = "716--732",
journal = "Peer-to-Peer Networking and Applications",
issn = "1936-6442",
publisher = "Springer New York",
number = "4",

}

TY - JOUR

T1 - Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis

AU - Jeong, Kitae

AU - Kang, Hyung Chul

AU - Lee, Changhoon

AU - Sung, Jaechul

AU - Hong, Seokhie

AU - Lim, Jong In

PY - 2015/7/20

Y1 - 2015/7/20

N2 - In this paper, we evaluate the security of lightweight block ciphers mCrypton and LED against biclique cryptanalysis. In cases of mCryton-64/96/128, our attacks require computational complexities of $2^{63.18}, 2^{94.81}$ and $2^{126.56}$, respectively. These results are the first known biclique cryptanalytic results on mCrypton. The attack on a 29-round reduced LED-64 needs $2^{63.58}$ 29-round reduced LED-64 encryptions. In the cases of LED-80/96/128, we propose the attacks on two versions. First, to recover the secret key of 45-round reduced LED-80/96/128, our attacks require computational complexities of $2^{79.45}, 2^{95.45}$ and $2^{127.45}$, respectively. To attack the full version, we require computational complexities of $2^{79.37}, 2^{95.37}$ and $2^{127.37}$, respectively. However, in these cases, we need the full codebook. These results are superior to known biclique cryptanalytic results on LED.

AB - In this paper, we evaluate the security of lightweight block ciphers mCrypton and LED against biclique cryptanalysis. In cases of mCryton-64/96/128, our attacks require computational complexities of $2^{63.18}, 2^{94.81}$ and $2^{126.56}$, respectively. These results are the first known biclique cryptanalytic results on mCrypton. The attack on a 29-round reduced LED-64 needs $2^{63.58}$ 29-round reduced LED-64 encryptions. In the cases of LED-80/96/128, we propose the attacks on two versions. First, to recover the secret key of 45-round reduced LED-80/96/128, our attacks require computational complexities of $2^{79.45}, 2^{95.45}$ and $2^{127.45}$, respectively. To attack the full version, we require computational complexities of $2^{79.37}, 2^{95.37}$ and $2^{127.37}$, respectively. However, in these cases, we need the full codebook. These results are superior to known biclique cryptanalytic results on LED.

KW - Biclique

KW - Block cipher

KW - Cryptanalysis

KW - LED

KW - mCrypton

UR - http://www.scopus.com/inward/record.url?scp=84934952272&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84934952272&partnerID=8YFLogxK

U2 - 10.1007/s12083-013-0208-4

DO - 10.1007/s12083-013-0208-4

M3 - Article

AN - SCOPUS:84934952272

VL - 8

SP - 716

EP - 732

JO - Peer-to-Peer Networking and Applications

JF - Peer-to-Peer Networking and Applications

SN - 1936-6442

IS - 4

ER -