2017
DOI: 10.1155/2017/7589306
|View full text |Cite
|
Sign up to set email alerts
|

Improved Biclique Cryptanalysis of the Lightweight Block Cipher Piccolo

Abstract: Biclique cryptanalysis is a typical attack through finding a biclique which is a type of bipartite diagram to reduce the computational complexity. By investigating the subkey distribution and the encryption structure, we find out a weakness in the key schedule of Piccolo-80. A 6-round biclique is constructed for Piccolo-80 and a 7-round biclique for Piccolo-128. Then a full round biclique cryptanalysis of Piccolo is presented. The results of the attacks are with data complexity of 2 40 and 2 24 chosen cipherte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
2

Relationship

3
5

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 14 publications
0
10
0
Order By: Relevance
“…In addition, 4 pieces in the form of 32 is used for key whitening. Round keys from the key generation phase are specified as RK i ∈ � 0, 1 { } 32 (0 ≤ i < 2r), with r being the number of rounds.…”
Section: Clefia Clefiamentioning
confidence: 99%
“…In addition, 4 pieces in the form of 32 is used for key whitening. Round keys from the key generation phase are specified as RK i ∈ � 0, 1 { } 32 (0 ≤ i < 2r), with r being the number of rounds.…”
Section: Clefia Clefiamentioning
confidence: 99%
“…For optimal computational complexity, we select V = F 1, 2 7 , a 16-bit output of seventh round, as the internal matching variable (Fig. 7).…”
Section: Matching Over 16 Roundsmentioning
confidence: 99%
“…The biclique attack has been applied to many block ciphers such as TWINE [5,6], Piccolo [7,8], LED [9], Skinny [10], IDEA [11], PRESENT [12,13], HIGHT [14], KLEIN [15] and Midori [16]. After that, IDEA was attacked utilising the narrow biclique technique [17] which is an extension of independent biclique attack.…”
Section: Introductionmentioning
confidence: 99%
“…proposed the selective encryption algorithm that has been widely used to protect the visual content of multimedia by only encrypting the specified parts of the multimedia data. A great variety of selective encryption algorithms [10][11][12][13][14][15][16] have been proposed in recent decades. Compared with full encryption algorithms, selective encryption has two main advantages as follows.…”
Section: Introductionmentioning
confidence: 99%