TY - GEN
T1 - Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses
AU - Lee, Changhoon
AU - Kim, Jongsung
AU - Hong, Seokhie
AU - Lee, Sangjin
AU - Sung, Jaechul
AU - Lee, Hwa Min
PY - 2008
Y1 - 2008
N2 - In this paper, we show that CIKS-128 and CIKS-128H are vulnerable to related-key differential attacks. We first describe how to construct their full-round related-key differential characteristics with high probabilities and then we exploit them to break the full-round CIKS-128 and CIKS-128H with 2 44, and 248 data and time complexities, respectively. These woks are corrections of Lee et al.'s results [7].
AB - In this paper, we show that CIKS-128 and CIKS-128H are vulnerable to related-key differential attacks. We first describe how to construct their full-round related-key differential characteristics with high probabilities and then we exploit them to break the full-round CIKS-128 and CIKS-128H with 2 44, and 248 data and time complexities, respectively. These woks are corrections of Lee et al.'s results [7].
UR - http://www.scopus.com/inward/record.url?scp=56649124944&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=56649124944&partnerID=8YFLogxK
U2 - 10.1109/CSA.2008.65
DO - 10.1109/CSA.2008.65
M3 - Conference contribution
AN - SCOPUS:56649124944
SN - 9780769534282
T3 - Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008
SP - 199
EP - 206
BT - Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008
T2 - 2008 International Symposium on Computer Science and its Applications, CSA 2008
Y2 - 13 October 2008 through 15 October 2008
ER -