Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses

Changhoon Lee, Jongsung Kim, Seokhie Hong, Sangjin Lee, Jaechul Sung, Hwa Min Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we show that CIKS-128 and CIKS-128H are vulnerable to related-key differential attacks. We first describe how to construct their full-round related-key differential characteristics with high probabilities and then we exploit them to break the full-round CIKS-128 and CIKS-128H with 2 44, and 248 data and time complexities, respectively. These woks are corrections of Lee et al.'s results [7].

Original languageEnglish
Title of host publicationProceedings - International Symposium on Computer Science and Its Applications, CSA 2008
Pages199-206
Number of pages8
DOIs
Publication statusPublished - 2008 Nov 28
Event2008 International Symposium on Computer Science and its Applications, CSA 2008 - Hobart, TAS, Australia
Duration: 2008 Oct 132008 Oct 15

Other

Other2008 International Symposium on Computer Science and its Applications, CSA 2008
CountryAustralia
CityHobart, TAS
Period08/10/1308/10/15

ASJC Scopus subject areas

  • Computer Science Applications

Cite this

Lee, C., Kim, J., Hong, S., Lee, S., Sung, J., & Lee, H. M. (2008). Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses. In Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008 (pp. 199-206). [4654086] https://doi.org/10.1109/CSA.2008.65

Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses. / Lee, Changhoon; Kim, Jongsung; Hong, Seokhie; Lee, Sangjin; Sung, Jaechul; Lee, Hwa Min.

Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008. 2008. p. 199-206 4654086.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lee, C, Kim, J, Hong, S, Lee, S, Sung, J & Lee, HM 2008, Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses. in Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008., 4654086, pp. 199-206, 2008 International Symposium on Computer Science and its Applications, CSA 2008, Hobart, TAS, Australia, 08/10/13. https://doi.org/10.1109/CSA.2008.65
Lee C, Kim J, Hong S, Lee S, Sung J, Lee HM. Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses. In Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008. 2008. p. 199-206. 4654086 https://doi.org/10.1109/CSA.2008.65
Lee, Changhoon ; Kim, Jongsung ; Hong, Seokhie ; Lee, Sangjin ; Sung, Jaechul ; Lee, Hwa Min. / Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses. Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008. 2008. pp. 199-206
@inproceedings{ce60a5a5911740969bc8af909751db43,
title = "Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses",
abstract = "In this paper, we show that CIKS-128 and CIKS-128H are vulnerable to related-key differential attacks. We first describe how to construct their full-round related-key differential characteristics with high probabilities and then we exploit them to break the full-round CIKS-128 and CIKS-128H with 2 44, and 248 data and time complexities, respectively. These woks are corrections of Lee et al.'s results [7].",
author = "Changhoon Lee and Jongsung Kim and Seokhie Hong and Sangjin Lee and Jaechul Sung and Lee, {Hwa Min}",
year = "2008",
month = "11",
day = "28",
doi = "10.1109/CSA.2008.65",
language = "English",
isbn = "9780769534282",
pages = "199--206",
booktitle = "Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008",

}

TY - GEN

T1 - Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses

AU - Lee, Changhoon

AU - Kim, Jongsung

AU - Hong, Seokhie

AU - Lee, Sangjin

AU - Sung, Jaechul

AU - Lee, Hwa Min

PY - 2008/11/28

Y1 - 2008/11/28

N2 - In this paper, we show that CIKS-128 and CIKS-128H are vulnerable to related-key differential attacks. We first describe how to construct their full-round related-key differential characteristics with high probabilities and then we exploit them to break the full-round CIKS-128 and CIKS-128H with 2 44, and 248 data and time complexities, respectively. These woks are corrections of Lee et al.'s results [7].

AB - In this paper, we show that CIKS-128 and CIKS-128H are vulnerable to related-key differential attacks. We first describe how to construct their full-round related-key differential characteristics with high probabilities and then we exploit them to break the full-round CIKS-128 and CIKS-128H with 2 44, and 248 data and time complexities, respectively. These woks are corrections of Lee et al.'s results [7].

UR - http://www.scopus.com/inward/record.url?scp=56649124944&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=56649124944&partnerID=8YFLogxK

U2 - 10.1109/CSA.2008.65

DO - 10.1109/CSA.2008.65

M3 - Conference contribution

AN - SCOPUS:56649124944

SN - 9780769534282

SP - 199

EP - 206

BT - Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008

ER -