Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Changhoon | - |
dc.contributor.author | Lee, Sangjin | - |
dc.contributor.author | Park, Jong Hyuk | - |
dc.contributor.author | Hussain, Sajid | - |
dc.contributor.author | Song, Jun Hwan | - |
dc.date.accessioned | 2022-12-20T16:10:39Z | - |
dc.date.available | 2022-12-20T16:10:39Z | - |
dc.date.created | 2022-08-27 | - |
dc.date.issued | 2010-08 | - |
dc.identifier.issn | 1018-4864 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/174338 | - |
dc.description.abstract | DDP-64, based on various controlled operations, is a 64-bit Feistel-like block cipher consisting of 10 rounds with a 128-bit key. It was designed to attempt to have a high security level and a high speed performance in hardware on ubiquitous computing systems and multimedia. In this paper, however, we show that DDP-64 doesn't have a high security level, more precisely, we show that it is vulnerable to related-key differential attack. This attack, which is much faster than the key exhaustive search, requires about 2(54) data and 2(54) time complexities. This work is the first known cryptanalytic result on DDP-64 so far. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.title | Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Song, Jun Hwan | - |
dc.identifier.doi | 10.1007/s11235-009-9264-8 | - |
dc.identifier.scopusid | 2-s2.0-77954887026 | - |
dc.identifier.wosid | 000279690400008 | - |
dc.identifier.bibliographicCitation | TELECOMMUNICATION SYSTEMS, v.44, no.3-4, pp.267 - 279 | - |
dc.relation.isPartOf | TELECOMMUNICATION SYSTEMS | - |
dc.citation.title | TELECOMMUNICATION SYSTEMS | - |
dc.citation.volume | 44 | - |
dc.citation.number | 3-4 | - |
dc.citation.startPage | 267 | - |
dc.citation.endPage | 279 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | KEY ATTACKS | - |
dc.subject.keywordPlus | CRYPTANALYSIS | - |
dc.subject.keywordPlus | ENCRYPTION | - |
dc.subject.keywordPlus | SPECTR-H64 | - |
dc.subject.keywordAuthor | Ubiquitous | - |
dc.subject.keywordAuthor | Block cipher | - |
dc.subject.keywordAuthor | DDP-64 | - |
dc.subject.keywordAuthor | Data-dependent permutation | - |
dc.subject.keywordAuthor | Related-key attack | - |
dc.subject.keywordAuthor | Differential cryptanalysis | - |
dc.identifier.url | https://link.springer.com/article/10.1007/s11235-009-9264-8 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.