A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Related-Key Differential Attacks on CHESS-64
2014
KSII Transactions on Internet and Information Systems
To break the cipher, an exhaustive attack is implemented to recover the rest 54 bits key. These works demonstrate an effective and general way to attack DDO-based ciphers. ...
Based on the differential properties of DDOs, we construct two types of related-key differential characteristics with one-bit difference in the master key. ...
In 2004, [11] proposed related-key differential attacks on full-round CIKS-128 and CIKS-128H. ...
doi:10.3837/tiis.2014.09.018
fatcat:itnoas5olfdllfcbfpbc6vhq2y
Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks
2021
KSII Transactions on Internet and Information Systems
In this study, we demonstrate new probability results on the security of the two TMN construction versions -TMN64 and TMN128, by proposing efficient related-key recovery attacks. ...
The high probability characteristics (DCs) are constructed under the related-key differential properties on a full number of function rounds of TMN64 and TMN128, as 10-rounds and 12rounds, respectively ...
(such as CIKS-1 [18] , SCO-family [7] and Cobra-family [19] [20] ), the Data-Dependent Operationbased constructions (such as CIKS-128 [8] , CIKS-128H [13] , MD-64 [5] and DDO-64 [14] ) and ...
doi:10.3837/tiis.2021.06.012
fatcat:4cdu2mcr3beebb736vvsuohl34