Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device

Changhoon Lee, Sangjin Lee, Jong Hyuk Park, Sajid Hussain, Jun Hwan Song

Research output: Contribution to journalArticle

5 Citations (Scopus)

Abstract

DDP-64, based on various controlled operations, is a 64-bit Feistel-like block cipher consisting of 10 rounds with a 128-bit key. It was designed to attempt to have a high security level and a high speed performance in hardware on ubiquitous computing systems and multimedia. In this paper, however, we show that DDP-64 doesn't have a high security level, more precisely, we show that it is vulnerable to related-key differential attack. This attack, which is much faster than the key exhaustive search, requires about 254 data and 254 time complexities. This work is the first known cryptanalytic result on DDP-64 so far.

Original languageEnglish
Pages (from-to)267-279
Number of pages13
JournalTelecommunication Systems
Volume44
Issue number3-4
DOIs
Publication statusPublished - 2010 Aug 1

Fingerprint

Ubiquitous computing
Computer hardware
Computer systems

Keywords

  • Block cipher
  • Data-dependent permutation
  • DDP-64
  • Differential cryptanalysis
  • Related-key attack
  • Ubiquitous

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Cite this

Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device. / Lee, Changhoon; Lee, Sangjin; Park, Jong Hyuk; Hussain, Sajid; Song, Jun Hwan.

In: Telecommunication Systems, Vol. 44, No. 3-4, 01.08.2010, p. 267-279.

Research output: Contribution to journalArticle

Lee, Changhoon ; Lee, Sangjin ; Park, Jong Hyuk ; Hussain, Sajid ; Song, Jun Hwan. / Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device. In: Telecommunication Systems. 2010 ; Vol. 44, No. 3-4. pp. 267-279.
@article{c11a80fcb4ce439da04b960751682a1e,
title = "Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device",
abstract = "DDP-64, based on various controlled operations, is a 64-bit Feistel-like block cipher consisting of 10 rounds with a 128-bit key. It was designed to attempt to have a high security level and a high speed performance in hardware on ubiquitous computing systems and multimedia. In this paper, however, we show that DDP-64 doesn't have a high security level, more precisely, we show that it is vulnerable to related-key differential attack. This attack, which is much faster than the key exhaustive search, requires about 254 data and 254 time complexities. This work is the first known cryptanalytic result on DDP-64 so far.",
keywords = "Block cipher, Data-dependent permutation, DDP-64, Differential cryptanalysis, Related-key attack, Ubiquitous",
author = "Changhoon Lee and Sangjin Lee and Park, {Jong Hyuk} and Sajid Hussain and Song, {Jun Hwan}",
year = "2010",
month = "8",
day = "1",
doi = "10.1007/s11235-009-9264-8",
language = "English",
volume = "44",
pages = "267--279",
journal = "Telecommunication Systems",
issn = "1018-4864",
publisher = "Springer Netherlands",
number = "3-4",

}

TY - JOUR

T1 - Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device

AU - Lee, Changhoon

AU - Lee, Sangjin

AU - Park, Jong Hyuk

AU - Hussain, Sajid

AU - Song, Jun Hwan

PY - 2010/8/1

Y1 - 2010/8/1

N2 - DDP-64, based on various controlled operations, is a 64-bit Feistel-like block cipher consisting of 10 rounds with a 128-bit key. It was designed to attempt to have a high security level and a high speed performance in hardware on ubiquitous computing systems and multimedia. In this paper, however, we show that DDP-64 doesn't have a high security level, more precisely, we show that it is vulnerable to related-key differential attack. This attack, which is much faster than the key exhaustive search, requires about 254 data and 254 time complexities. This work is the first known cryptanalytic result on DDP-64 so far.

AB - DDP-64, based on various controlled operations, is a 64-bit Feistel-like block cipher consisting of 10 rounds with a 128-bit key. It was designed to attempt to have a high security level and a high speed performance in hardware on ubiquitous computing systems and multimedia. In this paper, however, we show that DDP-64 doesn't have a high security level, more precisely, we show that it is vulnerable to related-key differential attack. This attack, which is much faster than the key exhaustive search, requires about 254 data and 254 time complexities. This work is the first known cryptanalytic result on DDP-64 so far.

KW - Block cipher

KW - Data-dependent permutation

KW - DDP-64

KW - Differential cryptanalysis

KW - Related-key attack

KW - Ubiquitous

UR - http://www.scopus.com/inward/record.url?scp=77954887026&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77954887026&partnerID=8YFLogxK

U2 - 10.1007/s11235-009-9264-8

DO - 10.1007/s11235-009-9264-8

M3 - Article

AN - SCOPUS:77954887026

VL - 44

SP - 267

EP - 279

JO - Telecommunication Systems

JF - Telecommunication Systems

SN - 1018-4864

IS - 3-4

ER -