A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is
To break the cipher, an exhaustive attack is implemented to recover the rest 54 bits key. These works demonstrate an effective and general way to attack DDO-based ciphers. ... Based on the differential properties of DDOs, we construct two types of related-key differential characteristics with one-bit difference in the master key. ... In 2004,  proposed related-key differential attacks on full-round CIKS-128 and CIKS-128H. ...doi:10.3837/tiis.2014.09.018 fatcat:itnoas5olfdllfcbfpbc6vhq2y
In this study, we demonstrate new probability results on the security of the two TMN construction versions -TMN64 and TMN128, by proposing efficient related-key recovery attacks. ... The high probability characteristics (DCs) are constructed under the related-key differential properties on a full number of function rounds of TMN64 and TMN128, as 10-rounds and 12rounds, respectively ... (such as CIKS-1  , SCO-family  and Cobra-family   ), the Data-Dependent Operationbased constructions (such as CIKS-128  , CIKS-128H  , MD-64  and DDO-64  ) and ...doi:10.3837/tiis.2021.06.012 fatcat:4cdu2mcr3beebb736vvsuohl34