Research Article

Biclique Cryptanalysis on the Full Crypton-256 and mCrypton-128

Table 1

Summary of the attacks of Crypton-256.

RoundsAttackComplexitiesReferences
DataTime

6Square232256[9]
6Imp. Diff.2912124[10]
8Stochastic21122112[11]
8Trunc. Diff.21262126.2[12]
9Rel. Imp. Diff.21052243[5]
12Biclique21002253.78This paper

Rel.: related key, Imp.: impossible, Diff.: differential, Trunc.: truncated.