IACR News item: 29 April 2015
Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, and Mohsen Shakiba
ePrint Report
In this paper we present the first biclique cryptanalysis of MIBS block cipher
and a new biclique cryptanalysis of PRESENT block cipher. These attacks are
performed on full-round MIBS-80 and full-round PRESENT-80. Attack on MIBS-
80 uses matching without matrix method and has a data complexity upper bounded
by $2^{52}$ chosen plaintext where it reduced security of this cipher about 1 bit. Attack
on PRESENT-80 has a data complexity of at most $2^{22}$ chosen plaintexts and computational
complexity of $2^{79.37}$ encryptions that both complexities are lower than other
cryptanalyses of PRESENT-80 so far.
Additional news items may be found on the IACR news page.