Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT

  • Authors:
  • Jorge Nakahara, Jr.;Pouyan Sepehrdad;Bingsheng Zhang;Meiqin Wang

  • Affiliations:
  • EPFL, Lausanne, Switzerland;EPFL, Lausanne, Switzerland;Cybernetica AS, Estonia and University of Tartu, Estonia;Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China 250100

  • Venue:
  • CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
  • Year:
  • 2009

Quantified Score

Hi-index 0.01

Visualization

Abstract

The contributions of this paper include the first linear hull and a revisit of the algebraic cryptanalysis of reduced-round variants of the block cipher PRESENT, under known-plaintext and ciphertext-only settings. We introduce a pure algebraic cryptanalysis of 5-round PRESENT and in one of our attacks we recover half of the bits of the key in less than three minutes using an ordinary desktop PC. The PRESENT block cipher is a design by Bogdanov et al. , announced in CHES 2007 and aimed at RFID tags and sensor networks. For our linear attacks, we can attack 25-round PRESENT with the whole code book, 296.68 25-round PRESENT encryptions, 240 blocks of memory and 0.61 success rate. Further we can extend the linear attack to 26-round with small success rate. As a further contribution of this paper we computed linear hulls in practice for the original PRESENT cipher, which corroborated and even improved on the predicted bias (and the corresponding attack complexities) of conventional linear relations based on a single linear trail.