Facebook Instagram Twitter RSS Feed PodBean Back to top on side

Cryptanalysis of CIKS-128 and CIKS-128H Suitable for Intelligent Multimedia and Ubiquitous Computing Systems

In: Computing and Informatics, vol. 30, no. 3
C. Lee - J. Kim - J. Sung - Y.-S. Lee - C.h. Lee

Details:

Year, pages: 2011, 447 - 466
Keywords:
Intelligent multimedia and ubiquitous computing systems, encryption algorithms, CIKS-128, CIKS-128H, related-key differential characteristics
About article:
Recently, data-dependent permutations (DDP) that are very suitable for intelligent multimedia and ubiquitous computing systems have been introduced as a new cryptographic primitive for the design of fast encryption systems. The CIKS-128 and CIKS-128H block ciphers are the typical examples of DDP-based encryption algorithms. In this paper, we show that CIKS-128 and CIKS-128H are vulnerable to related-key differential attacks. We first describe how to construct their full-round related-key differential characteristics with high probabilities and then we exploit them to break the full-round CIKS-128 and CIKS-128H with 2^44, and 2^48 data/time complexities, respectively.
How to cite:
ISO 690:
Lee, C., Kim, J., Sung, J., Lee, Y., Lee, C. 2011. Cryptanalysis of CIKS-128 and CIKS-128H Suitable for Intelligent Multimedia and Ubiquitous Computing Systems. In Computing and Informatics, vol. 30, no.3, pp. 447-466. 1335-9150.

APA:
Lee, C., Kim, J., Sung, J., Lee, Y., Lee, C. (2011). Cryptanalysis of CIKS-128 and CIKS-128H Suitable for Intelligent Multimedia and Ubiquitous Computing Systems. Computing and Informatics, 30(3), 447-466. 1335-9150.