Filters








2 Hits in 2.1 sec

Related-Key Differential Attacks on CHESS-64

2014 KSII Transactions on Internet and Information Systems  
To break the cipher, an exhaustive attack is implemented to recover the rest 54 bits key. These works demonstrate an effective and general way to attack DDO-based ciphers.  ...  Based on the differential properties of DDOs, we construct two types of related-key differential characteristics with one-bit difference in the master key.  ...  In 2004, [11] proposed related-key differential attacks on full-round CIKS-128 and CIKS-128H.  ... 
doi:10.3837/tiis.2014.09.018 fatcat:itnoas5olfdllfcbfpbc6vhq2y

Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks

2021 KSII Transactions on Internet and Information Systems  
In this study, we demonstrate new probability results on the security of the two TMN construction versions -TMN64 and TMN128, by proposing efficient related-key recovery attacks.  ...  The high probability characteristics (DCs) are constructed under the related-key differential properties on a full number of function rounds of TMN64 and TMN128, as 10-rounds and 12rounds, respectively  ...  (such as CIKS-1 [18] , SCO-family [7] and Cobra-family [19] [20] ), the Data-Dependent Operationbased constructions (such as CIKS-128 [8] , CIKS-128H [13] , MD-64 [5] and DDO-64 [14] ) and  ... 
doi:10.3837/tiis.2021.06.012 fatcat:4cdu2mcr3beebb736vvsuohl34