Abstract
Lightweight block ciphers provide security to resource-limited devices. However, many of these ciphers lack security analysis against basic attacks. This paper provides a detailed security analysis of two lightweight block ciphers, IVLBC and Eslice-64, against differential attack. The designers of IVLBC and Eslice-64 claimed that their ciphers were secure against differential attack. In this paper, to substantiate existing cryptanalysis’s claims, we perform differential attack on these two ciphers using the mixed-integer linear programming (MILP) method. We incorporate the difference distribution table (DDT) probabilities into MILP models. We discover differential distinguishers up to seven and 15 rounds for IVLBC and Eslice-64, respectively. We improve the known distinguishers for Eslice-64 by one round. Further, we mount the key recovery attack on an eight-round IVLBC and a 16-round Eslice-64 with data/memory/time complexities of 249/ 250.59/249 and 263/212.58/263 respectively.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.