DocumentCode :
3138824
Title :
Security Analysis of CIKS-128 and CIKS-128H Using Key Schedule Weaknesses
Author :
Lee, Changhoon ; Kim, Jongsung ; Hong, Seokhie ; Lee, Sangjin ; Sung, Jaechul ; Lee, Hwa-Min
Author_Institution :
Center for Inf. Security Technol., Korea Univ., Seoul
fYear :
2008
fDate :
13-15 Oct. 2008
Firstpage :
199
Lastpage :
206
Abstract :
In this paper, we show that CIKS-128 and CIKS-128H are vulnerable to related-key differential attacks. We first describe how to construct their full-round related-key differential characteristics with high probabilities and then we exploit them to break the full-round CIKS-128 and CIKS-128H with 244,and 248 data and time complexities, respectively. These woks are corrections of Lee et al.´s results [7].
Keywords :
security of data; CIKS-128; CIKS-128H; full-round related-key differential characteristics; key schedule weaknesses; related-key differential attacks; security analysis; Application software; Computer science; Computer security; Costs; Cryptography; Hardware; Information analysis; Information security; Mathematics; Processor scheduling; Block cipher; CIKS-128; CIKS-128H; Cryptanalysis; Data-dependent permutation; Related-key attack;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Science and its Applications, 2008. CSA '08. International Symposium on
Conference_Location :
Hobart, ACT
Print_ISBN :
978-0-7695-3428-2
Type :
conf
DOI :
10.1109/CSA.2008.65
Filename :
4654086
Link To Document :
بازگشت