|
|
|
|
Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments
|
|
|
|
|
|
|
|
نویسنده
|
Lee Changhoon ,Kim Jongsung ,Hong Seokhie ,Lee Yang-Sun
|
|
منبع
|
journal of universal computer science - 2009 - دوره : 15 - شماره : 5 - صفحه:1007 -1022
|
|
چکیده
|
Wireless networks, telecommunications, and information technologies connected devices in pervasive computing environments require a high speed encryption for providing a high security and a privacy. the chess-64 based on various controlled operations is designed for such applications. in this paper, however, we show that chess-64 doesn’t have a high security level, more precisely, we present two related-key differential attacks on chess-64. the first attack requires about 244 data and 244 time complexities (recovering 20 bits of the master key) while the second attack needs about 239 data and 239 time complexities (recovering 6 bits of the master key). these works are the first known cryptanalytic results on chess-64 so far.
|
|
کلیدواژه
|
Block Cipher ,CHESS-64 ,Data-Dependent Permutation ,Data-Dependent Operation ,Differential Cryptanalysis ,Related-Key Attack
|
|
آدرس
|
Hanshin University, Korea, Korea University, Korea, Korea University, Korea, FUMATE Co., Korea
|
|
پست الکترونیکی
|
yslee@fumate.com
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Authors
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|