{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T15:35:21Z","timestamp":1770046521517,"version":"3.49.0"},"reference-count":29,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2021,11,17]]},"abstract":"<jats:p>\n                    Security of a recently proposed bitwise block cipher GIFT is evaluated in this paper. In order to mount full round attacks on the cipher, biclique cryptanalysis method is applied. Both variants of the block cipher are attacked using Independent biclique approach. For recovering the secret keys of GIFT-64, the proposed attack requires 2\n                    <jats:sup>127.45<\/jats:sup>\n                    full GIFT-64 encryption and 2\n                    <jats:sup>8<\/jats:sup>\n                    chosen plain texts. For recovering the secret keys of GIFT-128, the proposed attack requires 2\n                    <jats:sup>127.82<\/jats:sup>\n                    full GIFT-128 encryption and 2\n                    <jats:sup>18<\/jats:sup>\n                    chosen plain texts. The attack complexity is compared with that of other attacks proposed previously. The security level of GIFT is also compared with that of the parent block cipher PRESENT, based on the analysis.\n                  <\/jats:p>","DOI":"10.3233\/jifs-189875","type":"journal-article","created":{"date-parts":[[2021,4,2]],"date-time":"2021-04-02T14:37:34Z","timestamp":1617374254000},"page":"5551-5560","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":3,"title":["New results in biclique cryptanalysis of full round GIFT"],"prefix":"10.1177","volume":"41","author":[{"given":"K.B.","family":"Jithendra","sequence":"first","affiliation":[{"name":"Department of Electronics and Communication, College of Engineering, Thalassery, Kerala, India"}]},{"given":"Shahana T.","family":"Kassim","sequence":"additional","affiliation":[{"name":"Division of Electronics, School of Engineering, Cochin University of Science and Technology, Kerala, India"}]}],"member":"179","published-online":{"date-parts":[[2021,4]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"crossref","unstructured":"BogdanovA. and RechbergerC. A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN. In: A. Biryukov G. Gong D.R. Stinson (eds.) SAC 2010. LNCS Springer Heidelberg vol. 6544 . pp. 229\u2013240.","DOI":"10.1007\/978-3-642-19574-7_16"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_19"},{"key":"e_1_3_1_4_2","doi-asserted-by":"crossref","unstructured":"BogdanovA. KnudsenL.R. and LeanderG. PRESENT: An Ultra-Lightweight Block Cipher. In: P. Paillier I. Verbauwhede (eds) Cryptographic Hardware and Embedded Systems \u2013CHES 2007. Lecture Notes in Computer Science Springer Berlin Heidelberg vol 4727. pp 450\u2013466.","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"e_1_3_1_5_2","doi-asserted-by":"crossref","unstructured":"ZhuB. DongX. and YuH. MILP-Based Differential Attack on Round-Reduced GIFT. In: Matsui M. (eds) Topics in Cryptology \u2013CT-RSA 2019. CT-RSA 2019. Lecture Notes in Computer Science (2019) vol 11405. Springer Cham pp. 372\u2013390.","DOI":"10.1007\/978-3-030-12612-4_19"},{"key":"e_1_3_1_6_2","doi-asserted-by":"crossref","unstructured":"BouillaguetC. DerbezP. and FouqueP. Automatic Search of Attacks on Round Reduced AES and Applications. In: Rogaway P. (ed.) CRYPTO 2011. LNCS Springer Heidelberg vol. 6841 pp. 169\u2013187.","DOI":"10.1007\/978-3-642-22792-9_10"},{"key":"e_1_3_1_7_2","doi-asserted-by":"crossref","unstructured":"HongD. KooB. and KwonD. Biclique Attack on the Full HIGHT ICISC 2011 LNCS 7259 Springer-Verlag 2012. pp. 365\u2013374.","DOI":"10.1007\/978-3-642-31912-9_24"},{"key":"e_1_3_1_8_2","doi-asserted-by":"crossref","unstructured":"KhovratovichD. RechbergerC. and SavelievaA. Bicliques for preimages: attacks on Skein-512 and the SHA-2 family (2011) FSE 2012 LNCS 7549 pp. 244\u2013263.","DOI":"10.1007\/978-3-642-34047-5_15"},{"key":"e_1_3_1_9_2","doi-asserted-by":"crossref","unstructured":"BihamE. DunkelmanO. and KellerN. Related-Key Impossible Differential Attacks on AES-192. In: Pointcheval D. (ed.) CT-RSA 2006. LNCS Springer Heidelberg 3860 (2006) 21\u201331.","DOI":"10.1007\/11605805_2"},{"key":"e_1_3_1_10_2","doi-asserted-by":"crossref","unstructured":"BihamE. and ShamirA. Differential cryptanalysis of DES-like cryptosystems. In A.J. Menezes S.A. Vanstone eds.: CRYPTO\u201990. Volume 537 of LNCS. Springer Heidelberg 1991 pp. 2\u201321.","DOI":"10.1007\/3-540-38424-3_1"},{"key":"e_1_3_1_11_2","unstructured":"AbedF. ForlerC. ListE. LucksS. and WenzelJ. Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers Cryptology ePrint Archive Report 2012\/591 2012."},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.14429\/dsj.66.9276"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2945006"},{"key":"e_1_3_1_14_2","doi-asserted-by":"crossref","unstructured":"MalaH. DakhilalianM. and RijmenV. Improved Impossible Differential Cryptanalysis of 7-Round AES-128. In: G. Gong K.C. Gupta (eds) Progress in Cryptology - INDOCRYPT 2010. Lecture Notes in Computer Science vol 6498. Springer Berlin Heidelberg (2010) pp. 282\u2013291.","DOI":"10.1007\/978-3-642-17401-8_20"},{"key":"e_1_3_1_15_2","doi-asserted-by":"crossref","unstructured":"GuoJ. LingS. et al. Advanced Meet-in-the-Middle PreimageAttacks: First Results on Full Tiger and Improved Results onMD4 and SHA-2. In:M.Abe (ed.)ASIACRYPT 2010. Springer Heidelberg LNCS vol. 6477 pp. 56\u201375.","DOI":"10.1007\/978-3-642-17373-8_4"},{"issue":"4","key":"e_1_3_1_16_2","first-page":"335","article-title":"Differential analysis of lightweight block cipher gift","volume":"5","author":"Zhao J.","year":"2018","unstructured":"ZhaoJ., et al., Differential analysis of lightweight block cipher gift, J. Cryptologic Res5(4) (2018), 335\u2013343.","journal-title":"J. Cryptologic Res"},{"key":"e_1_3_1_17_2","doi-asserted-by":"crossref","unstructured":"ChoJ.Y. Linear Cryptanalysis of Reduced-Round PRESENT. In: J. Pieprzyk (eds) Topics in Cryptology - CT-RSA 2010. Lecture Notes in Computer Science vol 5985. Springer Berlin Heidelberg (2010) pp. 302\u2013317.","DOI":"10.1007\/978-3-642-11925-5_21"},{"key":"e_1_3_1_18_2","doi-asserted-by":"crossref","unstructured":"AokiK. and SasakiY. Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. In: S. Halevi (ed.) CRYPTO 2009. LNCS Springer Heidelberg 5677 (2009) 70\u201389.","DOI":"10.1007\/978-3-642-03356-8_5"},{"key":"e_1_3_1_19_2","doi-asserted-by":"crossref","unstructured":"AokiK. and SasakiY. Preimage Attacks on One-Block MD4 63-StepMD5 andMore. In: R.M. Avanzi L. Keliher F. Sica (eds.) SAC 2008. LNCS Springer Heidelberg 5381 (2009) 103\u2013119.","DOI":"10.1007\/978-3-642-04159-4_7"},{"key":"e_1_3_1_20_2","unstructured":"JeongK. and KangH. Biclique cryptanalysis of lightweight block ciphers present piccolo and led. IACR Cryptol. ePrint Arch. p. 621 (2012)."},{"key":"e_1_3_1_21_2","doi-asserted-by":"crossref","unstructured":"OhkumaK. Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis. In: M.J. Jacobson V. Rijmen R. Safavi-Naini (eds) Selected Areas in Cryptography. SAC 2009. Lecture Notes in Computer Science Springer Berlin Heidelberg vol 5867. pp 249\u2013265.","DOI":"10.1007\/978-3-642-05445-7_16"},{"key":"e_1_3_1_22_2","doi-asserted-by":"crossref","unstructured":"JithendraK.B. and ShahanaT.K. New Biclique Cryptanalysis on Full-Round PRESENT-80 Block Cipher. Springer Nature Journal of Computer Science. 1 94 (2020). https:\/\/doi.org\/10.1007\/s42979-020-0103-z","DOI":"10.1007\/s42979-020-0103-z"},{"key":"e_1_3_1_23_2","doi-asserted-by":"crossref","unstructured":"\u00c7obanM. Karako\u00e7F. and Bizta\u00b8s\u00d6. Biclique Cryptanalysis of TWINE Cryptology ePrint Archive Report 2012\/422 2012.","DOI":"10.1007\/978-3-642-35404-5_5"},{"key":"e_1_3_1_24_2","doi-asserted-by":"crossref","unstructured":"MatsuiM. Linear Cryptanalysis Method for DES Cipher. In: Helleseth T. (eds) Advances in Cryptology \u2014EURO-CRYPT \u201993. EUROCRYPT 1993. Lecture Notes in Computer Science Springer vol 765. pp 386\u2013397.","DOI":"10.1007\/3-540-48285-7_33"},{"key":"e_1_3_1_25_2","doi-asserted-by":"crossref","unstructured":"PhanR.C. W.: Impossible Differential Cryptanalysis of 7-round Advanced Encryption Standard (AES). Information Processing Letters 91 (2004) 33\u201338.","DOI":"10.1016\/j.ipl.2004.02.018"},{"key":"e_1_3_1_26_2","doi-asserted-by":"crossref","unstructured":"BanikS. and PandeyS.K. GIFT:Asmall present - towards reaching the limit of lightweight encryption. In: Cryptographic Hardware and Embedded Systems \u2013CHES 2017 \u201319th International Conference Taipei Taiwan September 25\u201328 2017 Proceedings. pp. 321\u2013345.","DOI":"10.1007\/978-3-319-66787-4_16"},{"key":"e_1_3_1_27_2","unstructured":"ChenS. Biclique Attack of the Full ARIA-256 Cryptology ePrint Archive Report 2012\/011 2012."},{"key":"e_1_3_1_28_2","doi-asserted-by":"crossref","unstructured":"WuW. ZhangL. and BlockL. A Light weight Block Cipher. In: Lopez J. Tsudik G. (eds) Applied Cryptography and Network Security. ACNS 2011. Lecture Notes in Computer Science Springer Berlin Heidelberg vol 6715. pp 327\u2013344.","DOI":"10.1007\/978-3-642-21554-4_19"},{"key":"e_1_3_1_29_2","doi-asserted-by":"crossref","unstructured":"LiuY. and SasakiY. Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect. In: J. Jang-Jaccard F. Guo (eds) Information Security and Privacy. ACISP 2019. LNCS vol 11547. Springer Cham (2019) pp. 555\u2013572.","DOI":"10.1007\/978-3-030-21548-4_30"},{"key":"e_1_3_1_30_2","doi-asserted-by":"crossref","unstructured":"GongZ. NikovaS. and LawY.W. KLEIN: A New Family of Lightweight Block Ciphers. In: A. Juels C. Paar (eds) RFID. Security and Privacy. RFIDSec 2011. Lecture Notes in Computer Science Springer Berlin Heidelberg vol 7055. pp 1\u201318.","DOI":"10.1007\/978-3-642-25286-0_1"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-189875","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-189875","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-189875","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T04:23:01Z","timestamp":1770006181000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-189875"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":29,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,11,17]]}},"alternative-id":["10.3233\/JIFS-189875"],"URL":"https:\/\/doi.org\/10.3233\/jifs-189875","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4]]}}}