2011
DOI: 10.1007/978-3-642-23951-9_22
|View full text |Cite
|
Sign up to set email alerts
|

The LED Block Cipher

Abstract: Abstract. We present a new block cipher LED. While dedicated to compact hardware implementation, and offering the smallest silicon footprint among comparable block ciphers, the cipher has been designed to simultaneously tackle three additional goals. First, we explore the role of an ultra-light (in fact non-existent) key schedule. Second, we consider the resistance of ciphers, and LED in particular, to related-key attacks: we are able to derive simple yet interesting AES-like security proofs for LED regarding … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
398
0
3

Year Published

2012
2012
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 635 publications
(452 citation statements)
references
References 41 publications
1
398
0
3
Order By: Relevance
“…In general, such an approach could lead to efficient lightweight designs. Interestingly, it is also the direction taken, to a certain extent, by the recently proposed block cipher LED [20]. In its 64-bit version, this cipher just iterates blocks made of 4 rounds and the addition of the master key.…”
Section: Conclusion Open Problems and Future Workmentioning
confidence: 99%
“…In general, such an approach could lead to efficient lightweight designs. Interestingly, it is also the direction taken, to a certain extent, by the recently proposed block cipher LED [20]. In its 64-bit version, this cipher just iterates blocks made of 4 rounds and the addition of the master key.…”
Section: Conclusion Open Problems and Future Workmentioning
confidence: 99%
“…This case is interesting since it is the two-round analogue of the "alternating" key-schedule of LED-128 [GPPR11] (which has twelve rounds), where the master key K = (k, k ) is twice as long as the block length, and round keys k and k are alternatively xored to the state. This setting is intermediate between the case of perfectly independent round keys and the case of an n-bit master key (in particular, the sum-capture theorem is only required to upper bound |BadK 1 |).…”
Section: B Probability Of Bad Transcripts For Two Alternated Independmentioning
confidence: 99%
“…Also, the lightweight hash function PHOTON [5] and the block cipher LED [7] use MDS matrices based on Eq. (1).…”
Section: Definitionmentioning
confidence: 99%