Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses

Changhoon Lee, Jongsung Kim, Seokhie Hong, Sangjin Lee, Jaechul Sung, Hwa Min Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we show that CIKS-128 and CIKS-128H are vulnerable to related-key differential attacks. We first describe how to construct their full-round related-key differential characteristics with high probabilities and then we exploit them to break the full-round CIKS-128 and CIKS-128H with 2 44, and 248 data and time complexities, respectively. These woks are corrections of Lee et al.'s results [7].

Original languageEnglish
Title of host publicationProceedings - International Symposium on Computer Science and Its Applications, CSA 2008
Pages199-206
Number of pages8
DOIs
Publication statusPublished - 2008
Event2008 International Symposium on Computer Science and its Applications, CSA 2008 - Hobart, TAS, Australia
Duration: 2008 Oct 132008 Oct 15

Publication series

NameProceedings - International Symposium on Computer Science and Its Applications, CSA 2008

Other

Other2008 International Symposium on Computer Science and its Applications, CSA 2008
CountryAustralia
CityHobart, TAS
Period08/10/1308/10/15

ASJC Scopus subject areas

  • Computer Science Applications

Cite this

Lee, C., Kim, J., Hong, S., Lee, S., Sung, J., & Lee, H. M. (2008). Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses. In Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008 (pp. 199-206). [4654086] (Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008). https://doi.org/10.1109/CSA.2008.65