Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Changhoon-
dc.contributor.authorKim, Jongsung-
dc.contributor.authorHong, Seokhie-
dc.contributor.authorLee, Yang-Sun-
dc.date.accessioned2021-09-09T01:02:37Z-
dc.date.available2021-09-09T01:02:37Z-
dc.date.created2021-06-10-
dc.date.issued2009-
dc.identifier.issn0948-695X-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/122105-
dc.description.abstractWireless networks, telecommunications, and information technologies connected devices in pervasive computing environments require a high speed encryption for providing a high security and a privacy. The CHESS-64 based on various controlled operations is designed for such applications. In this paper, however, we show that CHESS-64 doesn't have a high security level, more precisely, we present two related-key differential attacks on CHESS-64. The first attack requires about 2(44) data and 2(44) time complexities (recovering 20 bits of the master key) while the second attack needs about 2(39) data and 2(39) time complexities (recovering 6 bits of the master key). These works are the first known cryptanalytic results on CHESS-64 so far.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherGRAZ UNIV TECHNOLGOY, INST INFORMATION SYSTEMS COMPUTER MEDIA-IICM-
dc.subjectKEY-
dc.subjectATTACKS-
dc.subjectCRYPTANALYSIS-
dc.subjectENCRYPTION-
dc.subjectSPECTR-H64-
dc.titleSecurity Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments-
dc.typeArticle-
dc.contributor.affiliatedAuthorHong, Seokhie-
dc.identifier.scopusid2-s2.0-67650298977-
dc.identifier.wosid000269281000004-
dc.identifier.bibliographicCitationJOURNAL OF UNIVERSAL COMPUTER SCIENCE, v.15, no.5, pp.1007 - 1022-
dc.relation.isPartOfJOURNAL OF UNIVERSAL COMPUTER SCIENCE-
dc.citation.titleJOURNAL OF UNIVERSAL COMPUTER SCIENCE-
dc.citation.volume15-
dc.citation.number5-
dc.citation.startPage1007-
dc.citation.endPage1022-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordPlusKEY-
dc.subject.keywordPlusATTACKS-
dc.subject.keywordPlusCRYPTANALYSIS-
dc.subject.keywordPlusENCRYPTION-
dc.subject.keywordPlusSPECTR-H64-
dc.subject.keywordAuthorBlock Cipher-
dc.subject.keywordAuthorCHESS-64-
dc.subject.keywordAuthorData-Dependent Permutation-
dc.subject.keywordAuthorData-Dependent Operation-
dc.subject.keywordAuthorDifferential Cryptanalysis-
dc.subject.keywordAuthorRelated-Key Attack-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hong, Seok hie photo

Hong, Seok hie
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE