Zobrazeno 1 - 10
of 53
pro vyhledávání: '"Kitae Jeong"'
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 10 (2014)
PRINTcipher-48/96 are 48/96-bit block ciphers proposed in CHES 2010 which support the 80/160-bit secret keys, respectively. In this paper, we propose related-key cryptanalysis of PRINTcipher. To recover the 80-bit secret key of PRINTcipher-48, our at
Externí odkaz:
https://doaj.org/article/a83d50a2bbd74a5ebe33fb65959235b0
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 9 (2013)
PP-1 is a scalable block cipher which can be implemented on a platform with limited resource. In this paper, we analyze the security of PP-1 by using truncated differential cryptanalysis. As concrete examples, we consider four versions of PP-1, PP-1/
Externí odkaz:
https://doaj.org/article/2f3e183ff0c949dd961a446b03b43fc5
Publikováno v:
Journal of Applied Mathematics, Vol 2013 (2013)
In Choukri and Tunstall (2005), the authors showed that if they decreased the number of rounds in AES by injecting faults, it is possible to recover the secret key. In this paper, we propose fault injection attacks on HMAC/NMAC by applying the main i
Externí odkaz:
https://doaj.org/article/3b1dfe5fe446467ea00b6d03248dc641
Publikováno v:
Journal of Applied Mathematics, Vol 2013 (2013)
At AES’00, a collision attack on 7-round reduced AES was proposed. In this paper, we apply this idea to seven SPN block ciphers, AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis. Applying our attacks on AES-192/256, we improve the attack r
Externí odkaz:
https://doaj.org/article/69780b604d2e41e0adbcd9093ce8a893
Publikováno v:
Journal of the Institute of Electronics and Information Engineers. 51:34-40
Publikováno v:
International Journal of Computer Mathematics. 90:2553-2563
PRESENT is a hardware-optimized 64-bit lightweight block cipher which supports 80-and 128-bit secret keys. In this paper, we propose a differential fault analysis DFA on PRESENT-80/128. The proposed attack is based on a 2-byte random fault model. In
Publikováno v:
Sensor Letters. 11:1765-1770
Publikováno v:
Sensor Letters. 11:1755-1764
Publikováno v:
Sensor Letters. 11:1783-1791
Publikováno v:
Peer-to-Peer Networking and Applications. 8:716-732
In this paper, we evaluate the security of lightweight block ciphers mCrypton and LED against biclique cryptanalysis. In cases of mCryton-64/96/128, our attacks require computational complexities of \(2^{63.18}, 2^{94.81}\) and \(2^{126.56}\), respec