Side Channel Cube Attack on PRESENT

  • Authors:
  • Lin Yang;Meiqin Wang;Siyuan Qiao

  • Affiliations:
  • Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China 250100 and Department of Physics, Tsinghua University, Beijing, China 10 ...;Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China 250100;Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China 250100

  • Venue:
  • CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

As an ultra-lightweight block cipher, PRESENT is presented by A. Bogdanov et al. in CHES 2007. In this paper, we detect the non-random properties in the first four rounds of PRESENT based on cube attack proposed by Shamir et al. By analyzing the features of the S-box and pLayer, we give the side channel cube attack on PRESENT. If any output bit of the third round is leaked, we can recover the total 80-bit key. Especially, for the leaked bit 1, bit 2 or bit 3 of the output bits in the third round, we can also recover 80-bit key with lower computing complexity compared to other leaked bits, and our attack requires 215 chosen plaintexts and 232 31-round PRESENT encryptions.