Date Added: May 2011
In this paper, the authors analyze the recently proposed light-weight block cipher PRINTCipher. Applying algebraic methods and SAT-solving they are able to break 8 rounds of PRINTCipher-48 with only 2 known plaintexts and 9 rounds under some additional assumptions. They show that it is possible to break the full 48-round cipher by assuming a moderate leakage of internal state bits or even just hamming weights. Such a simulation side-channel attack has practical complexity. They investigate applicability of the method to cryptanalysis of the full PRINTCipher-48.