Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Security analysis of the full-round DDO-64 block cipher

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Changhoon-
dc.contributor.authorKim, Jongsung-
dc.contributor.authorHong, Seokhie-
dc.contributor.authorSung, Jaechul-
dc.contributor.authorLee, Sangjin-
dc.date.accessioned2021-09-09T02:03:39Z-
dc.date.available2021-09-09T02:03:39Z-
dc.date.created2021-06-10-
dc.date.issued2008-12-
dc.identifier.issn0164-1212-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/122301-
dc.description.abstractDDO-64 is a 64-bit Feistel-like block cipher based on data-dependent operations (DDOs). It is composed of 8 rounds and uses a 128-bit key. There are two versions of DDO-64, named DDO-64V(1) and DDO-64V(2), according to the key schedule. They were designed under an attempt for improving the security and performance of DDP-based ciphers. In this paper, however, we show that like most of the existing DDP-based ciphers, DDO-64V(1) and DDO-64V(2) are also vulnerable to related-key attacks. The attack on DDO-64V(1) requires 2(35.5) related-key chosen plaintexts and 2(63.5) encryptions while the attack on DDO-64V(2) only needs 8 related-key chosen plaintexts and 2(31) encryptions: our attacks are both mainly due to their simple key schedules and structural weaknesses. These works are the first known cryptanalytic results on DDO-64V(1) and DDO-64V(2) so far. (C) 2008 Elsevier Inc. All rights reserved.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherELSEVIER SCIENCE INC-
dc.subjectPERMUTATION INSTRUCTIONS-
dc.subjectKEY-
dc.subjectATTACKS-
dc.subjectCRYPTANALYSIS-
dc.subjectSPECTR-H64-
dc.subjectBOOMERANG-
dc.titleSecurity analysis of the full-round DDO-64 block cipher-
dc.typeArticle-
dc.contributor.affiliatedAuthorHong, Seokhie-
dc.contributor.affiliatedAuthorLee, Sangjin-
dc.identifier.doi10.1016/j.jss.2008.04.039-
dc.identifier.scopusid2-s2.0-54049122177-
dc.identifier.wosid000261119800016-
dc.identifier.bibliographicCitationJOURNAL OF SYSTEMS AND SOFTWARE, v.81, no.12, pp.2328 - 2335-
dc.relation.isPartOfJOURNAL OF SYSTEMS AND SOFTWARE-
dc.citation.titleJOURNAL OF SYSTEMS AND SOFTWARE-
dc.citation.volume81-
dc.citation.number12-
dc.citation.startPage2328-
dc.citation.endPage2335-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordPlusPERMUTATION INSTRUCTIONS-
dc.subject.keywordPlusKEY-
dc.subject.keywordPlusATTACKS-
dc.subject.keywordPlusCRYPTANALYSIS-
dc.subject.keywordPlusSPECTR-H64-
dc.subject.keywordPlusBOOMERANG-
dc.subject.keywordAuthorCryptography-
dc.subject.keywordAuthorBlock cipher-
dc.subject.keywordAuthorRelated-key attack-
dc.subject.keywordAuthorDifferential attack-
dc.subject.keywordAuthorBoomerang attack-
dc.subject.keywordAuthorData-dependent operation-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher LEE, SANG JIN photo

LEE, SANG JIN
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE