Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses

Changhoon Lee, Jongsung Kim, Seokhie Hong, Sangjin Lee, Jaechul Sung, Hwa Min Lee

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper, we show that CIKS-128 and CIKS-128H are vulnerable to related-key differential attacks. We first describe how to construct their full-round related-key differential characteristics with high probabilities and then we exploit them to break the full-round CIKS-128 and CIKS-128H with 2 44, and 248 data and time complexities, respectively. These woks are corrections of Lee et al.'s results [7].

Original languageEnglish
Title of host publicationProceedings - International Symposium on Computer Science and Its Applications, CSA 2008
Pages199-206
Number of pages8
DOIs
StatePublished - 2008
Event2008 International Symposium on Computer Science and its Applications, CSA 2008 - Hobart, TAS, Australia
Duration: 13 Oct 200815 Oct 2008

Publication series

NameProceedings - International Symposium on Computer Science and Its Applications, CSA 2008

Conference

Conference2008 International Symposium on Computer Science and its Applications, CSA 2008
Country/TerritoryAustralia
CityHobart, TAS
Period13/10/0815/10/08

Fingerprint

Dive into the research topics of 'Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses'. Together they form a unique fingerprint.

Cite this