About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper

Cryptanalysis of PRESENT-like ciphers with secret S-boxes

From

Discrete mathematics, Department of Mathematics, Technical University of Denmark1

Department of Mathematics, Technical University of Denmark2

At Eurocrypt 2001, Biryukov and Shamir investigated the security of AES-like ciphers where the substitutions and affine transformations are all key-dependent and successfully cryptanalysed two and a half rounds. This paper considers PRESENT-like ciphers in a similar manner. We focus on the settings where the S-boxes are key dependent, and repeated for every round.

We break one particular variant which was proposed in 2009 with practical complexity in a chosen plaintext/chosen ciphertext scenario. Extrapolating these results suggests that up to 28 rounds of such ciphers can be broken. Furthermore, we outline how our attack strategy can be applied to an extreme case where the S-boxes are chosen uniformly at random for each round and where the bit permutation is secret as well. © 2011 Springer-Verlag.

Language: English
Year: 2011
Pages: 270-289
Proceedings: 18th International Workshop on Fast Software Encryption
ISSN: 16113349 and 03029743
Types: Conference paper
DOI: 10.1007/978-3-642-21702-9_16
ORCIDs: Knudsen, Lars Ramkilde

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis