Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity
Author(s):
Article Type:
Research/Original Article (دارای رتبه معتبر)
Abstract:
In the biclique attack, a shorter biclique usually results in less data complexity, but at the expense of more computational complexity. The early abort technique can be used in partial matching part of the biclique attack in order to slightly reduce the computations. In this paper, we make use of this technique, but instead of slight improvement in the computational complexity, we keep the amount of this complexity the same and reduce the data complexity enormously by a shorter biclique.
With this approach, we analysed full-round of LBlock, and also LBlock with modified key schedule (which was designed to resist biclique attack) both with data complexity 2^12, while the data complexity of the best biclique attack on the former was 2^52 and for the latter there is no attack on the full-round cipher, so far. Then we proposed a new key schedule that is more resistant against biclique cryptanalysis, though the low diffusion of the cipher makes it vulnerable to this attack regardless of the strength of the key schedule. Also using this method, we analyzed TWINE-80 with 2^12 data complexity. The lowest data complexity for the prior attack on the TWINE-80 was 2^60. In all the attacks presented in this paper, the computational complexities are slightly improved in comparison to the existing attacks
Keywords:
Language:
English
Published:
International Journal of Information Security, Volume:11 Issue: 1, Jan 2019
Pages:
57 to 74
https://www.magiran.com/p1939373
سامانه نویسندگان
مقالات دیگری از این نویسنده (گان)
-
Spotting and Mitigating DDoS Attacks Using Deep Learning for Online Traffic Analysis
Mojtaba Shirinjani, Mojtaba Amiri, Amirhosein Salehi, Pouria Arefi Jamal, Rasoul Khazaei Laki, Seyed Hatef Sadegh Esfahani, Siavash Ahmadi, Masoumeh Koochak Shooshtari *,
International Journal of Information Security, Jul 2025 -
A Lightweight Online Intrusion Detection and Localization Framework for Industrial Control Systems
Amirhosein Salehi *, Siavash Ahmadi,
International Journal of Information Security, Jul 2025