Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses

Changhoon Lee, Jongsung Kim, Seokhie Hong, Sangjin Lee, Jaechul Sung, Hwa Min Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we show that CIKS-128 and CIKS-128H are vulnerable to related-key differential attacks. We first describe how to construct their full-round related-key differential characteristics with high probabilities and then we exploit them to break the full-round CIKS-128 and CIKS-128H with 2 44, and 248 data and time complexities, respectively. These woks are corrections of Lee et al.'s results [7].

Original languageEnglish
Title of host publicationProceedings - International Symposium on Computer Science and Its Applications, CSA 2008
Pages199-206
Number of pages8
DOIs
Publication statusPublished - 2008
Event2008 International Symposium on Computer Science and its Applications, CSA 2008 - Hobart, TAS, Australia
Duration: 2008 Oct 132008 Oct 15

Publication series

NameProceedings - International Symposium on Computer Science and Its Applications, CSA 2008

Other

Other2008 International Symposium on Computer Science and its Applications, CSA 2008
Country/TerritoryAustralia
CityHobart, TAS
Period08/10/1308/10/15

ASJC Scopus subject areas

  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses'. Together they form a unique fingerprint.

Cite this