Research Article

Biclique Cryptanalysis on the Full Crypton-256 and mCrypton-128

Table 2

Summary of the attacks of mCrypton-128.

RoundsAttackComplexitiesReferences
DataTime

8Rel. Rec.246246[6]
9Rel. Imp. Diff.259.7266.7[7]
12Biclique2482126.56[13]
12Biclique2522126.5This paper

Rel.: related key, Imp.: impossible, Diff.: differential, Rec.: rectangle.