Security analysis of the full-round DDO-64 block cipher
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Changhoon | - |
dc.contributor.author | Kim, Jongsung | - |
dc.contributor.author | Hong, Seokhie | - |
dc.contributor.author | Sung, Jaechul | - |
dc.contributor.author | Lee, Sangjin | - |
dc.date.accessioned | 2021-09-09T02:03:39Z | - |
dc.date.available | 2021-09-09T02:03:39Z | - |
dc.date.created | 2021-06-10 | - |
dc.date.issued | 2008-12 | - |
dc.identifier.issn | 0164-1212 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/122301 | - |
dc.description.abstract | DDO-64 is a 64-bit Feistel-like block cipher based on data-dependent operations (DDOs). It is composed of 8 rounds and uses a 128-bit key. There are two versions of DDO-64, named DDO-64V(1) and DDO-64V(2), according to the key schedule. They were designed under an attempt for improving the security and performance of DDP-based ciphers. In this paper, however, we show that like most of the existing DDP-based ciphers, DDO-64V(1) and DDO-64V(2) are also vulnerable to related-key attacks. The attack on DDO-64V(1) requires 2(35.5) related-key chosen plaintexts and 2(63.5) encryptions while the attack on DDO-64V(2) only needs 8 related-key chosen plaintexts and 2(31) encryptions: our attacks are both mainly due to their simple key schedules and structural weaknesses. These works are the first known cryptanalytic results on DDO-64V(1) and DDO-64V(2) so far. (C) 2008 Elsevier Inc. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCIENCE INC | - |
dc.subject | PERMUTATION INSTRUCTIONS | - |
dc.subject | KEY | - |
dc.subject | ATTACKS | - |
dc.subject | CRYPTANALYSIS | - |
dc.subject | SPECTR-H64 | - |
dc.subject | BOOMERANG | - |
dc.title | Security analysis of the full-round DDO-64 block cipher | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hong, Seokhie | - |
dc.contributor.affiliatedAuthor | Lee, Sangjin | - |
dc.identifier.doi | 10.1016/j.jss.2008.04.039 | - |
dc.identifier.scopusid | 2-s2.0-54049122177 | - |
dc.identifier.wosid | 000261119800016 | - |
dc.identifier.bibliographicCitation | JOURNAL OF SYSTEMS AND SOFTWARE, v.81, no.12, pp.2328 - 2335 | - |
dc.relation.isPartOf | JOURNAL OF SYSTEMS AND SOFTWARE | - |
dc.citation.title | JOURNAL OF SYSTEMS AND SOFTWARE | - |
dc.citation.volume | 81 | - |
dc.citation.number | 12 | - |
dc.citation.startPage | 2328 | - |
dc.citation.endPage | 2335 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | PERMUTATION INSTRUCTIONS | - |
dc.subject.keywordPlus | KEY | - |
dc.subject.keywordPlus | ATTACKS | - |
dc.subject.keywordPlus | CRYPTANALYSIS | - |
dc.subject.keywordPlus | SPECTR-H64 | - |
dc.subject.keywordPlus | BOOMERANG | - |
dc.subject.keywordAuthor | Cryptography | - |
dc.subject.keywordAuthor | Block cipher | - |
dc.subject.keywordAuthor | Related-key attack | - |
dc.subject.keywordAuthor | Differential attack | - |
dc.subject.keywordAuthor | Boomerang attack | - |
dc.subject.keywordAuthor | Data-dependent operation | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.