Knowledge (XXG)

CIKS-1

Source đź“ť

1683: 1711: 313:
Changhoon Lee; Deukjo Hong; Sungjae Lee; Sangjin Lee; Hyungjin Yang; Jongin Lim (2002). "A Chosen Plaintext Linear Attack on Block Cipher CIKS-1". In Robert Deng; Sihan Qing; Feng Bao; Jianying Zhou (eds.).
1663: 1493: 250: 1346: 1281: 362: 1108: 464: 146:
of 64 bits. It uses an 8 round structure in which half of the block determines the transformation of the other half in each round, similar to a
158:
also undergoes a transformation dependent on the data. CIKS-1 uses four types of operations: data-dependent permutations, fixed permutations,
1748: 1098: 592: 999: 1261: 1235: 1103: 316:
Information and Communications Security: 4th International Conference, ICICS 2002, Singapore, December 9–12, 2002 : Proceedings
1076: 1339: 323: 1245: 355: 1124: 1542: 1302: 1772: 1332: 392: 1777: 1658: 1613: 1426: 1188: 348: 1537: 1205: 1115: 1093: 406: 186: 1741: 1653: 1210: 1066: 1019: 494: 143: 71: 1643: 1633: 1488: 1276: 1158: 1033: 402: 1638: 1628: 1431: 1391: 1384: 1374: 1369: 1215: 1004: 375: 1767: 1379: 1307: 1183: 1178: 1130: 979: 1686: 1532: 1478: 1297: 1120: 557: 285: 230: 1734: 1648: 1572: 1200: 1083: 1009: 692: 672: 92: 1411: 1163: 1140: 459: 110: 1517: 1501: 1448: 1148: 1056: 768: 697: 667: 612: 163: 155: 1577: 1567: 1438: 868: 567: 527: 522: 489: 449: 397: 319: 1718: 1512: 1240: 1135: 1014: 873: 753: 722: 416: 1087: 1071: 1060: 994: 953: 918: 848: 828: 702: 582: 577: 532: 298: 243: 1587: 1507: 1468: 1416: 1401: 1225: 1173: 984: 969: 908: 903: 788: 537: 178: 147: 84: 1761: 1668: 1623: 1582: 1562: 1458: 1421: 1396: 1220: 1168: 1047: 1029: 818: 793: 783: 607: 597: 444: 103: 1618: 1463: 1453: 1443: 1406: 1355: 1153: 974: 938: 803: 682: 637: 469: 421: 371: 170: 128: 120: 1597: 763: 758: 642: 200: 185:, so keys should be chosen carefully. The same researchers have also proposed a 136: 1557: 1527: 1522: 1483: 1195: 913: 853: 737: 732: 677: 547: 410: 268: 213: 132: 49: 139:
of bits, so is better suited to implementation in hardware than in software.
131:
designed in 2002 by A.A. Moldovyan and N.A. Moldovyan. Like its predecessor,
1547: 928: 923: 813: 727: 622: 602: 1710: 259: 204: 1592: 1552: 1266: 1230: 1024: 687: 562: 542: 454: 182: 174: 61: 933: 883: 843: 833: 778: 773: 617: 426: 1473: 1271: 893: 888: 823: 808: 798: 743: 717: 712: 707: 587: 177:
of 256 bits. Kidney, Heys, and Norvell showed that round keys of low
989: 948: 898: 878: 863: 652: 632: 552: 517: 838: 747: 662: 657: 647: 627: 499: 484: 1328: 344: 943: 858: 479: 474: 264: 209: 159: 151: 1722: 1494:
Cryptographically secure pseudorandom number generator
332: 1606: 1362: 1290: 1254: 1043: 962: 508: 435: 383: 101: 91: 80: 70: 60: 55: 45: 37: 29: 24: 260:"A Differential Attack on the CIKS-1 Block Cipher" 205:"A Weight Based Attack on the CIKS-1 Block Cipher" 1742: 1340: 356: 8: 19: 169:The designers of CIKS-1 didn't specify any 1749: 1735: 1347: 1333: 1325: 363: 349: 341: 337: 333: 189:of CIKS-1 which uses 2 chosen plaintexts. 249:CS1 maint: multiple names: authors list ( 1717:This cryptography-related article is a 258:B. Kidney; H. Heys; T. Norvell (2004). 294: 283: 239: 228: 18: 7: 1707: 1705: 173:for the cipher, but it uses a total 1721:. You can help Knowledge (XXG) by 203:, T. Norvell (November 12, 2003). 14: 33:A.A. Moldovyan and N.A. Moldovyan 1709: 1682: 1681: 1543:Information-theoretic security 318:. Springer. pp. 456–468. 1: 1659:Message authentication code 1614:Cryptographic hash function 1427:Cryptographic hash function 1794: 1704: 1538:Harvest now, decrypt later 187:differential cryptanalysis 1677: 1654:Post-quantum cryptography 1324: 1246:Time/memory/data tradeoff 340: 336: 113:using 2 chosen plaintexts 109: 1644:Quantum key distribution 1634:Authenticated encryption 1489:Random number generation 1034:Whitening transformation 1639:Public-key cryptography 1629:Symmetric-key algorithm 1432:Key derivation function 1392:Cryptographic primitive 1385:Authentication protocol 1375:Outline of cryptography 1370:History of cryptography 1005:Confusion and diffusion 135:, it relies heavily on 1380:Cryptographic protocol 293:Cite journal requires 238:Cite journal requires 1533:End-to-end encryption 1479:Cryptojacking malware 1298:Initialization vector 1773:Broken block ciphers 1649:Quantum cryptography 1573:Trusted timestamping 1077:3-subset MITM attack 693:Intel Cascade Cipher 673:Hasty Pudding cipher 154:. In each round the 142:The algorithm has a 1412:Cryptographic nonce 1116:Differential-linear 111:Differential attack 21: 1778:Cryptography stubs 1518:Subliminal channel 1502:Pseudorandom noise 1449:Key (cryptography) 1189:Differential-fault 407:internal mechanics 1730: 1729: 1699: 1698: 1695: 1694: 1578:Key-based routing 1568:Trapdoor function 1439:Digital signature 1320: 1319: 1316: 1315: 1303:Mode of operation 980:Lai–Massey scheme 117: 116: 1785: 1751: 1744: 1737: 1713: 1706: 1685: 1684: 1513:Insecure channel 1349: 1342: 1335: 1326: 1174:Power-monitoring 1015:Avalanche effect 723:Khufu and Khafre 376:security summary 365: 358: 351: 342: 338: 334: 329: 302: 296: 291: 289: 281: 279: 277: 272: 254: 247: 241: 236: 234: 226: 224: 222: 217: 22: 1793: 1792: 1788: 1787: 1786: 1784: 1783: 1782: 1758: 1757: 1756: 1755: 1702: 1700: 1691: 1673: 1602: 1358: 1353: 1312: 1286: 1255:Standardization 1250: 1179:Electromagnetic 1131:Integral/Square 1088:Piling-up lemma 1072:Biclique attack 1061:EFF DES cracker 1045: 1039: 970:Feistel network 958: 583:CIPHERUNICORN-E 578:CIPHERUNICORN-A 510: 504: 437: 431: 385: 379: 369: 326: 312: 309: 307:Further reading 292: 282: 275: 273: 262: 257: 248: 237: 227: 220: 218: 207: 198: 195: 181:are relatively 38:First published 17: 12: 11: 5: 1791: 1789: 1781: 1780: 1775: 1770: 1760: 1759: 1754: 1753: 1746: 1739: 1731: 1728: 1727: 1714: 1697: 1696: 1693: 1692: 1690: 1689: 1678: 1675: 1674: 1672: 1671: 1666: 1664:Random numbers 1661: 1656: 1651: 1646: 1641: 1636: 1631: 1626: 1621: 1616: 1610: 1608: 1604: 1603: 1601: 1600: 1595: 1590: 1588:Garlic routing 1585: 1580: 1575: 1570: 1565: 1560: 1555: 1550: 1545: 1540: 1535: 1530: 1525: 1520: 1515: 1510: 1508:Secure channel 1505: 1499: 1498: 1497: 1486: 1481: 1476: 1471: 1469:Key stretching 1466: 1461: 1456: 1451: 1446: 1441: 1436: 1435: 1434: 1429: 1419: 1417:Cryptovirology 1414: 1409: 1404: 1402:Cryptocurrency 1399: 1394: 1389: 1388: 1387: 1377: 1372: 1366: 1364: 1360: 1359: 1354: 1352: 1351: 1344: 1337: 1329: 1322: 1321: 1318: 1317: 1314: 1313: 1311: 1310: 1305: 1300: 1294: 1292: 1288: 1287: 1285: 1284: 1279: 1274: 1269: 1264: 1258: 1256: 1252: 1251: 1249: 1248: 1243: 1238: 1233: 1228: 1223: 1218: 1213: 1208: 1203: 1198: 1193: 1192: 1191: 1186: 1181: 1176: 1171: 1161: 1156: 1151: 1146: 1138: 1133: 1128: 1121:Distinguishing 1118: 1113: 1112: 1111: 1106: 1101: 1091: 1081: 1080: 1079: 1074: 1064: 1053: 1051: 1041: 1040: 1038: 1037: 1027: 1022: 1017: 1012: 1007: 1002: 997: 992: 987: 985:Product cipher 982: 977: 972: 966: 964: 960: 959: 957: 956: 951: 946: 941: 936: 931: 926: 921: 916: 911: 906: 901: 896: 891: 886: 881: 876: 871: 866: 861: 856: 851: 846: 841: 836: 831: 826: 821: 816: 811: 806: 801: 796: 791: 786: 781: 776: 771: 766: 761: 756: 751: 740: 735: 730: 725: 720: 715: 710: 705: 700: 695: 690: 685: 680: 675: 670: 665: 660: 655: 650: 645: 640: 635: 630: 625: 620: 615: 613:Cryptomeria/C2 610: 605: 600: 595: 590: 585: 580: 575: 570: 565: 560: 555: 550: 545: 540: 535: 530: 525: 520: 514: 512: 506: 505: 503: 502: 497: 492: 487: 482: 477: 472: 467: 462: 457: 452: 447: 441: 439: 433: 432: 430: 429: 424: 419: 414: 400: 395: 389: 387: 381: 380: 370: 368: 367: 360: 353: 345: 331: 330: 324: 308: 305: 304: 303: 295:|journal= 255: 240:|journal= 194: 191: 179:Hamming weight 164:addition mod 4 148:Feistel cipher 115: 114: 107: 106: 99: 98: 95: 89: 88: 82: 78: 77: 74: 68: 67: 64: 58: 57: 53: 52: 47: 43: 42: 39: 35: 34: 31: 27: 26: 15: 13: 10: 9: 6: 4: 3: 2: 1790: 1779: 1776: 1774: 1771: 1769: 1768:Block ciphers 1766: 1765: 1763: 1752: 1747: 1745: 1740: 1738: 1733: 1732: 1726: 1724: 1720: 1715: 1712: 1708: 1703: 1688: 1680: 1679: 1676: 1670: 1669:Steganography 1667: 1665: 1662: 1660: 1657: 1655: 1652: 1650: 1647: 1645: 1642: 1640: 1637: 1635: 1632: 1630: 1627: 1625: 1624:Stream cipher 1622: 1620: 1617: 1615: 1612: 1611: 1609: 1605: 1599: 1596: 1594: 1591: 1589: 1586: 1584: 1583:Onion routing 1581: 1579: 1576: 1574: 1571: 1569: 1566: 1564: 1563:Shared secret 1561: 1559: 1556: 1554: 1551: 1549: 1546: 1544: 1541: 1539: 1536: 1534: 1531: 1529: 1526: 1524: 1521: 1519: 1516: 1514: 1511: 1509: 1506: 1503: 1500: 1495: 1492: 1491: 1490: 1487: 1485: 1482: 1480: 1477: 1475: 1472: 1470: 1467: 1465: 1462: 1460: 1459:Key generator 1457: 1455: 1452: 1450: 1447: 1445: 1442: 1440: 1437: 1433: 1430: 1428: 1425: 1424: 1423: 1422:Hash function 1420: 1418: 1415: 1413: 1410: 1408: 1405: 1403: 1400: 1398: 1397:Cryptanalysis 1395: 1393: 1390: 1386: 1383: 1382: 1381: 1378: 1376: 1373: 1371: 1368: 1367: 1365: 1361: 1357: 1350: 1345: 1343: 1338: 1336: 1331: 1330: 1327: 1323: 1309: 1306: 1304: 1301: 1299: 1296: 1295: 1293: 1289: 1283: 1280: 1278: 1275: 1273: 1270: 1268: 1265: 1263: 1260: 1259: 1257: 1253: 1247: 1244: 1242: 1239: 1237: 1234: 1232: 1229: 1227: 1224: 1222: 1219: 1217: 1214: 1212: 1209: 1207: 1204: 1202: 1201:Interpolation 1199: 1197: 1194: 1190: 1187: 1185: 1182: 1180: 1177: 1175: 1172: 1170: 1167: 1166: 1165: 1162: 1160: 1157: 1155: 1152: 1150: 1147: 1145: 1144: 1139: 1137: 1134: 1132: 1129: 1126: 1122: 1119: 1117: 1114: 1110: 1107: 1105: 1102: 1100: 1097: 1096: 1095: 1092: 1089: 1085: 1082: 1078: 1075: 1073: 1070: 1069: 1068: 1065: 1062: 1058: 1055: 1054: 1052: 1049: 1048:cryptanalysis 1042: 1035: 1031: 1030:Key whitening 1028: 1026: 1023: 1021: 1018: 1016: 1013: 1011: 1008: 1006: 1003: 1001: 998: 996: 993: 991: 988: 986: 983: 981: 978: 976: 973: 971: 968: 967: 965: 961: 955: 952: 950: 947: 945: 942: 940: 937: 935: 932: 930: 927: 925: 922: 920: 917: 915: 912: 910: 907: 905: 902: 900: 897: 895: 892: 890: 887: 885: 882: 880: 877: 875: 872: 870: 867: 865: 862: 860: 857: 855: 852: 850: 847: 845: 842: 840: 837: 835: 832: 830: 827: 825: 822: 820: 819:New Data Seal 817: 815: 812: 810: 807: 805: 802: 800: 797: 795: 792: 790: 787: 785: 782: 780: 777: 775: 772: 770: 767: 765: 762: 760: 757: 755: 752: 749: 745: 741: 739: 736: 734: 731: 729: 726: 724: 721: 719: 716: 714: 711: 709: 706: 704: 701: 699: 696: 694: 691: 689: 686: 684: 681: 679: 676: 674: 671: 669: 666: 664: 661: 659: 656: 654: 651: 649: 646: 644: 641: 639: 636: 634: 631: 629: 626: 624: 621: 619: 616: 614: 611: 609: 606: 604: 601: 599: 596: 594: 591: 589: 586: 584: 581: 579: 576: 574: 571: 569: 566: 564: 561: 559: 558:BEAR and LION 556: 554: 551: 549: 546: 544: 541: 539: 536: 534: 531: 529: 526: 524: 521: 519: 516: 515: 513: 507: 501: 498: 496: 493: 491: 488: 486: 483: 481: 478: 476: 473: 471: 468: 466: 463: 461: 458: 456: 453: 451: 448: 446: 443: 442: 440: 434: 428: 425: 423: 420: 418: 415: 412: 408: 404: 401: 399: 396: 394: 391: 390: 388: 382: 377: 373: 372:Block ciphers 366: 361: 359: 354: 352: 347: 346: 343: 339: 335: 327: 325:9783540001645 321: 317: 311: 310: 306: 300: 287: 270: 266: 261: 256: 252: 245: 232: 215: 211: 206: 202: 197: 196: 192: 190: 188: 184: 180: 176: 172: 167: 165: 161: 157: 153: 149: 145: 140: 138: 134: 130: 126: 122: 112: 108: 105: 104:cryptanalysis 100: 96: 94: 90: 87:-like network 86: 83: 79: 75: 73: 69: 65: 63: 59: 56:Cipher detail 54: 51: 48: 44: 40: 36: 32: 28: 23: 1723:expanding it 1716: 1701: 1619:Block cipher 1464:Key schedule 1454:Key exchange 1444:Kleptography 1407:Cryptosystem 1356:Cryptography 1206:Partitioning 1164:Side-channel 1142: 1109:Higher-order 1094:Differential 975:Key schedule 572: 315: 286:cite journal 274:. Retrieved 231:cite journal 219:. Retrieved 171:key schedule 168: 141: 137:permutations 129:block cipher 124: 121:cryptography 118: 102:Best public 46:Derived from 41:January 2002 16:Block cipher 1607:Mathematics 1598:Mix network 1291:Utilization 1277:NSA Suite B 1262:AES process 1211:Rubber-hose 1149:Related-key 1057:Brute-force 436:Less common 199:B. Kidney, 72:Block sizes 1762:Categories 1558:Ciphertext 1528:Decryption 1523:Encryption 1484:Ransomware 1241:Chi-square 1159:Rotational 1099:Impossible 1020:Block size 914:Spectr-H64 738:Ladder-DES 733:Kuznyechik 678:Hierocrypt 548:BassOmatic 511:algorithms 438:algorithms 411:Triple DES 386:algorithms 276:January 3, 269:PostScript 221:January 3, 214:PostScript 193:References 144:block size 133:Spectr-H64 50:Spectr-H64 1548:Plaintext 1216:Black-bag 1136:Boomerang 1125:Known-key 1104:Truncated 929:Threefish 924:SXAL/MBAL 814:MultiSwap 769:MacGuffin 728:KN-Cipher 668:Grand Cru 623:CS-Cipher 603:COCONUT98 81:Structure 62:Key sizes 30:Designers 1687:Category 1593:Kademlia 1553:Codetext 1496:(CSPRNG) 1267:CRYPTREC 1231:Weak key 1184:Acoustic 1025:Key size 869:Red Pike 688:IDEA NXT 568:Chiasmus 563:CAST-256 543:BaseKing 528:Akelarre 523:Adiantum 490:Skipjack 455:CAST-128 450:Camellia 398:Blowfish 175:key size 66:256 bits 1363:General 1308:Padding 1226:Rebound 934:Treyfer 884:SAVILLE 844:PRESENT 834:NOEKEON 779:MAGENTA 774:Madryga 754:Lucifer 618:CRYPTON 427:Twofish 417:Serpent 201:H. Heys 85:Feistel 76:64 bits 25:General 1474:Keygen 1272:NESSIE 1221:Davies 1169:Timing 1084:Linear 1044:Attack 963:Design 954:Zodiac 919:Square 894:SHACAL 889:SC2000 849:Prince 829:Nimbus 824:NewDES 809:MULTI2 799:MISTY1 742:LOKI ( 718:KHAZAD 713:KeeLoq 708:KASUMI 703:Kalyna 588:CLEFIA 573:CIKS-1 533:Anubis 384:Common 322:  162:, and 125:CIKS-1 93:Rounds 20:CIKS-1 1504:(PRN) 1154:Slide 1010:Round 995:P-box 990:S-box 949:XXTEA 909:Speck 904:Simon 899:SHARK 879:SAFER 864:REDOC 789:Mercy 748:89/91 698:Iraqi 663:G-DES 653:FEA-M 633:DES-X 598:Cobra 553:BATON 538:Ascon 518:3-Way 509:Other 127:is a 1719:stub 1282:CNSA 1141:Mod 1067:MITM 839:NUSH 794:MESH 784:MARS 658:FROG 648:FEAL 628:DEAL 608:Crab 593:CMEA 500:XTEA 485:SEED 465:IDEA 460:GOST 445:ARIA 320:ISBN 299:help 278:2007 251:link 244:help 223:2007 183:weak 160:XORs 1236:Tau 1196:XSL 1000:SPN 944:xmx 939:UES 874:S-1 859:RC2 804:MMB 683:ICE 638:DFC 495:TEA 480:RC6 475:RC5 470:LEA 422:SM4 403:DES 393:AES 265:PDF 210:PDF 156:key 152:RC5 150:or 119:In 1764:: 764:M8 759:M6 746:, 744:97 643:E2 409:, 290:: 288:}} 284:{{ 235:: 233:}} 229:{{ 166:. 123:, 1750:e 1743:t 1736:v 1725:. 1348:e 1341:t 1334:v 1143:n 1127:) 1123:( 1090:) 1086:( 1063:) 1059:( 1050:) 1046:( 1036:) 1032:( 854:Q 750:) 413:) 405:( 378:) 374:( 364:e 357:t 350:v 328:. 301:) 297:( 280:. 271:) 267:/ 263:( 253:) 246:) 242:( 225:. 216:) 212:/ 208:( 97:8

Index

Spectr-H64
Key sizes
Block sizes
Feistel
Rounds
cryptanalysis
Differential attack
cryptography
block cipher
Spectr-H64
permutations
block size
Feistel cipher
RC5
key
XORs
addition mod 4
key schedule
key size
Hamming weight
weak
differential cryptanalysis
H. Heys
"A Weight Based Attack on the CIKS-1 Block Cipher"
PDF
PostScript
cite journal
help
link
"A Differential Attack on the CIKS-1 Block Cipher"

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑