TY - JOUR
T1 - Cryptanalysis of CIKS-128 and CIKS-128H suitable for intelligent multimedia and ubiquitous computing systems
AU - Lee, Changhoon
AU - Kim, Jongsung
AU - Sung, Jaechul
AU - Lee, Yang Sun
AU - Lee, Chang Hoon
PY - 2011
Y1 - 2011
N2 - Recently, data-dependent permutations (DDP) that are very suitable for intelligent multimedia and ubiquitous computing systems have been introduced as a new cryptographic primitive for the design of fast encryption systems. The CIKS-128 and CIKS-128H block ciphers are the typical examples of DDP-based encryption algorithms. In this paper, we show that CIKS-128 and CIKS-128H are vulnerable to related-key differential attacks. We first describe how to construct their full-round related-key differential characteristics with high probabilities and then we exploit them to break the full-round CIKS-128 and CIKS-128H with 244, and 248 data/time complexities, respectively.
AB - Recently, data-dependent permutations (DDP) that are very suitable for intelligent multimedia and ubiquitous computing systems have been introduced as a new cryptographic primitive for the design of fast encryption systems. The CIKS-128 and CIKS-128H block ciphers are the typical examples of DDP-based encryption algorithms. In this paper, we show that CIKS-128 and CIKS-128H are vulnerable to related-key differential attacks. We first describe how to construct their full-round related-key differential characteristics with high probabilities and then we exploit them to break the full-round CIKS-128 and CIKS-128H with 244, and 248 data/time complexities, respectively.
KW - CIKS-128
KW - CIKS-128H
KW - Encryption algorithms
KW - Intelligent multimedia and ubiquitous computing systems
KW - Related-key differential characteristics
UR - http://www.scopus.com/inward/record.url?scp=80052077962&partnerID=8YFLogxK
M3 - Article
AN - SCOPUS:80052077962
SN - 1335-9150
VL - 30
SP - 447
EP - 466
JO - Computing and Informatics
JF - Computing and Informatics
IS - 3
ER -