Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Changhoon | - |
dc.contributor.author | Kim, Jongsung | - |
dc.contributor.author | Hong, Seokhie | - |
dc.contributor.author | Lee, Yang-Sun | - |
dc.date.accessioned | 2021-09-09T01:02:37Z | - |
dc.date.available | 2021-09-09T01:02:37Z | - |
dc.date.created | 2021-06-10 | - |
dc.date.issued | 2009 | - |
dc.identifier.issn | 0948-695X | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/122105 | - |
dc.description.abstract | Wireless networks, telecommunications, and information technologies connected devices in pervasive computing environments require a high speed encryption for providing a high security and a privacy. The CHESS-64 based on various controlled operations is designed for such applications. In this paper, however, we show that CHESS-64 doesn't have a high security level, more precisely, we present two related-key differential attacks on CHESS-64. The first attack requires about 2(44) data and 2(44) time complexities (recovering 20 bits of the master key) while the second attack needs about 2(39) data and 2(39) time complexities (recovering 6 bits of the master key). These works are the first known cryptanalytic results on CHESS-64 so far. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | GRAZ UNIV TECHNOLGOY, INST INFORMATION SYSTEMS COMPUTER MEDIA-IICM | - |
dc.subject | KEY | - |
dc.subject | ATTACKS | - |
dc.subject | CRYPTANALYSIS | - |
dc.subject | ENCRYPTION | - |
dc.subject | SPECTR-H64 | - |
dc.title | Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hong, Seokhie | - |
dc.identifier.scopusid | 2-s2.0-67650298977 | - |
dc.identifier.wosid | 000269281000004 | - |
dc.identifier.bibliographicCitation | JOURNAL OF UNIVERSAL COMPUTER SCIENCE, v.15, no.5, pp.1007 - 1022 | - |
dc.relation.isPartOf | JOURNAL OF UNIVERSAL COMPUTER SCIENCE | - |
dc.citation.title | JOURNAL OF UNIVERSAL COMPUTER SCIENCE | - |
dc.citation.volume | 15 | - |
dc.citation.number | 5 | - |
dc.citation.startPage | 1007 | - |
dc.citation.endPage | 1022 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | KEY | - |
dc.subject.keywordPlus | ATTACKS | - |
dc.subject.keywordPlus | CRYPTANALYSIS | - |
dc.subject.keywordPlus | ENCRYPTION | - |
dc.subject.keywordPlus | SPECTR-H64 | - |
dc.subject.keywordAuthor | Block Cipher | - |
dc.subject.keywordAuthor | CHESS-64 | - |
dc.subject.keywordAuthor | Data-Dependent Permutation | - |
dc.subject.keywordAuthor | Data-Dependent Operation | - |
dc.subject.keywordAuthor | Differential Cryptanalysis | - |
dc.subject.keywordAuthor | Related-Key Attack | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.