Loading...

Biclique Cryptanalysis of Lightweight Block Ciphers

Ahmadi, Siavash | 2014

742 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 46276 (05)
  4. University: Sharif University of Technology
  5. Department: Electrical Engineering
  6. Advisor(s): Aref, Mohammad Reza; Mohajeri, Javad
  7. Abstract:
  8. Along with the proliferation of pervasive systems such as RFID systems and sensor networks, the demand for the low-cost, secure-enough primitives has continued to rise. Symmetric-key algorithms especially block ciphers still play an important role as secure ciphers that can be also consistent with the inherent restrictions of pervasive systems. Recently, a lot of block ciphers tailored for these conditions have been designed, such as Present, PrintCipher, Piccolo, and Twine. Biclique attack introduced in AsiaCrypt 2011 is the first and the only method that could break all versions of AES faster than brute-force attack in the single key model. Afterwards, the efficiency of this attack on some other block ciphers such as Hight, Piccolo, Twine, and LBlock was examined and resulted in successful attacks on these ciphers. In biclique cryptanalysis, some of the first or the last rounds of the target algorithm are covered by the biclique, and the other rounds are analyzed by meet in the middle like attack to reduce the computational complexity, e.g. partial matching with precomputation and recomputation. The data and dominant computational complexities of the attack are determined by the biclique and matching part, respectively.
    In spite of the most of the statistical attacks whose computational complexities increase exponentially with the number of rounds, biclique attack can be applied to the full-round version of the ciphers, but often with marginally improved computational complexity. Furthermore, the data complexity of the attack is usually impractical.
    In this thesis, we analyze the resistance of a number of lightweight block ciphers against biclique attack and propose new methods to improve this attack in the view point of data and computational complexity, such as low data complexity asymmetric biclique cryptanalysis as well as early abort technique. Then, we apply our methods to the biclique attack on those lightweight block ciphers and finally compare the results with the previous biclique attacks
  9. Keywords:
  10. Block Cipher ; Complexity ; Biclique Cryptanalysis ; Early Abort Technique

 Digital Object List

 Bookmark

...see more