Title :
Security Analysis of CIKS-128 and CIKS-128H Using Key Schedule Weaknesses
Author :
Lee, Changhoon ; Kim, Jongsung ; Hong, Seokhie ; Lee, Sangjin ; Sung, Jaechul ; Lee, Hwa-Min
Author_Institution :
Center for Inf. Security Technol., Korea Univ., Seoul
Abstract :
In this paper, we show that CIKS-128 and CIKS-128H are vulnerable to related-key differential attacks. We first describe how to construct their full-round related-key differential characteristics with high probabilities and then we exploit them to break the full-round CIKS-128 and CIKS-128H with 244,and 248 data and time complexities, respectively. These woks are corrections of Lee et al.´s results [7].
Keywords :
security of data; CIKS-128; CIKS-128H; full-round related-key differential characteristics; key schedule weaknesses; related-key differential attacks; security analysis; Application software; Computer science; Computer security; Costs; Cryptography; Hardware; Information analysis; Information security; Mathematics; Processor scheduling; Block cipher; CIKS-128; CIKS-128H; Cryptanalysis; Data-dependent permutation; Related-key attack;
Conference_Titel :
Computer Science and its Applications, 2008. CSA '08. International Symposium on
Conference_Location :
Hobart, ACT
Print_ISBN :
978-0-7695-3428-2
DOI :
10.1109/CSA.2008.65