The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021
DOI: 10.3233/jifs-189875
|View full text |Cite
|
Sign up to set email alerts
|

New results in biclique cryptanalysis of full round GIFT

Abstract: Security of a recently proposed bitwise block cipher GIFT is evaluated in this paper. In order to mount full round attacks on the cipher, biclique cryptanalysis method is applied. Both variants of the block cipher are attacked using Independent biclique approach. For recovering the secret keys of GIFT-64, the proposed attack requires 2127.45 full GIFT-64 encryption and 28 chosen plain texts. For recovering the secret keys of GIFT-128, the proposed attack requires 2127.82 full GIFT-128 encryption and 218 chosen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…− Related-key attacks: These attacks leverage similarities in the key schedules of different ciphers to break one cipher and then attack others. The recent proposal of the Biclique cryptanalysis technique has shown promise in exploiting related-key relationships in some block ciphers, raising concerns about potential vulnerabilities in cipher families [38]. − Algebraic attacks: These attacks utilize algebraic properties of the cipher's S-boxes or round functions to find weaknesses.…”
mentioning
confidence: 99%
“…− Related-key attacks: These attacks leverage similarities in the key schedules of different ciphers to break one cipher and then attack others. The recent proposal of the Biclique cryptanalysis technique has shown promise in exploiting related-key relationships in some block ciphers, raising concerns about potential vulnerabilities in cipher families [38]. − Algebraic attacks: These attacks utilize algebraic properties of the cipher's S-boxes or round functions to find weaknesses.…”
mentioning
confidence: 99%