[PDF][PDF] Cryptanalysis of block ciphers

J Lu - 2008 - repository.royalholloway.ac.uk
The block cipher is one of the most important primitives in modern cryptography, information
and network security; one of the primary purposes of such ciphers is to provide …

Related-key attack on the MD-64 block cipher suitable for pervasive computing environments

J Kang, K Jeong, SS Yeo, C Lee - 2012 26th International …, 2012 - ieeexplore.ieee.org
MD-64 is a 64-bit block cipher with a 128-bit secret key and is based on data-dependent
operations for the fast hardware performance. MD-64 is suitable to applications in resource …

Related-key attacks on the full-round Cobra-F64a and Cobra-F64b

J Lu, C Lee, J Kim - Security and Cryptography for Networks: 5th …, 2006 - Springer
Cobra-F64a and Cobra-F64b, designed for firmware-oriented applications, are 64-bit Data-
dependent Permutation based block ciphers with 128 key bits, which consist of 16 and 20 …

Related-key amplified boomerang attacks on the full-round Eagle-64 and Eagle-128

K Jeong, C Lee, J Sung, S Hong, J Lim - Australasian Conference on …, 2007 - Springer
In this paper we show that the full-round Eagle-64 and Eagle-128 are vulnerable to the
related-key amplified boomerang attack. The attack on the full-round Eagle-64 requires 2 65 …

Distinguishing attack on SDDO-based block cipher BMD-128

J Kang, K Jeong, C Lee, S Hong - Ubiquitous Information Technologies …, 2014 - Springer
Abstract BMD-128 is a 128-bit block cipher with a 256-bit secret key and is based on
switchable data-dependent operations. By using these operators, this algorithm was …

[PDF][PDF] Related-Key Amplified Boomerang Attack on Full-Round MM-128

H Eom, B Seok, C Lee - HUMAN-CENTRIC COMPUTING AND …, 2023 - hcisj.com
Recently, the use of open platforms with various network functions and hardware interfaces
has been increasing in various fields such as the Internet of Things, smart buildings, and …

Cryptanalysis of the XO-64 Suitable for Wireless Systems

TSD Phuc, NN Xiong, C Lee - Wireless Personal Communications, 2017 - Springer
Data-dependent operations (DDOs) that were introduced by Moldovyan in 2003 (Moldovyan
in MMM-ACNS 2003, LNCS, 2776: 316–327, Springer, Heidelberg, 5; Moldovyan et al. in Int …

Combined differential, linear and related-key attacks on block ciphers and MAC algorithms

J Kim - Cryptology ePrint Archive, 2006 - eprint.iacr.org
Differential and linear attacks are the most widely used cryptanalytic tools to evaluate the
security of symmetric-key cryptography. Since the introduction of differential and linear …

Security analysis of the full-round DDO-64 block cipher

C Lee, J Kim, S Hong, J Sung, S Lee - Journal of Systems and Software, 2008 - Elsevier
DDO-64 is a 64-bit Feistel-like block cipher based on data-dependent operations (DDOs). It
is composed of 8 rounds and uses a 128-bit key. There are two versions of DDO-64, named …

[PDF][PDF] Cobra-H64/128 算法的相关密钥-差分攻击

罗伟, 郭建胜 - 电子学报, 2013 - ejournal.org.cn
本文研究了Cobra-H64/128 分组密码算法在相关密钥-差分攻击下的安全性. 针对Cobra-H64
算法, 利用新构造的相关密钥-差分路径和CP 逆变换存在的信息泄露规律给出攻击算法1 …