1683:
1711:
313:
Changhoon Lee; Deukjo Hong; Sungjae Lee; Sangjin Lee; Hyungjin Yang; Jongin Lim (2002). "A Chosen
Plaintext Linear Attack on Block Cipher CIKS-1". In Robert Deng; Sihan Qing; Feng Bao; Jianying Zhou (eds.).
1663:
1493:
250:
1346:
1281:
362:
1108:
464:
146:
of 64 bits. It uses an 8 round structure in which half of the block determines the transformation of the other half in each round, similar to a
158:
also undergoes a transformation dependent on the data. CIKS-1 uses four types of operations: data-dependent permutations, fixed permutations,
1748:
1098:
592:
999:
1261:
1235:
1103:
316:
Information and
Communications Security: 4th International Conference, ICICS 2002, Singapore, December 9–12, 2002 : Proceedings
1076:
1339:
323:
1245:
355:
1124:
1542:
1302:
1772:
1332:
392:
1777:
1658:
1613:
1426:
1188:
348:
1537:
1205:
1115:
1093:
406:
186:
1741:
1653:
1210:
1066:
1019:
494:
143:
71:
1643:
1633:
1488:
1276:
1158:
1033:
402:
1638:
1628:
1431:
1391:
1384:
1374:
1369:
1215:
1004:
375:
1767:
1379:
1307:
1183:
1178:
1130:
979:
1686:
1532:
1478:
1297:
1120:
557:
285:
230:
1734:
1648:
1572:
1200:
1083:
1009:
692:
672:
92:
1411:
1163:
1140:
459:
110:
1517:
1501:
1448:
1148:
1056:
768:
697:
667:
612:
163:
155:
1577:
1567:
1438:
868:
567:
527:
522:
489:
449:
397:
319:
1718:
1512:
1240:
1135:
1014:
873:
753:
722:
416:
1087:
1071:
1060:
994:
953:
918:
848:
828:
702:
582:
577:
532:
298:
243:
1587:
1507:
1468:
1416:
1401:
1225:
1173:
984:
969:
908:
903:
788:
537:
178:
147:
84:
1761:
1668:
1623:
1582:
1562:
1458:
1421:
1396:
1220:
1168:
1047:
1029:
818:
793:
783:
607:
597:
444:
103:
1618:
1463:
1453:
1443:
1406:
1355:
1153:
974:
938:
803:
682:
637:
469:
421:
371:
170:
128:
120:
1597:
763:
758:
642:
200:
185:, so keys should be chosen carefully. The same researchers have also proposed a
136:
1557:
1527:
1522:
1483:
1195:
913:
853:
737:
732:
677:
547:
410:
268:
213:
132:
49:
139:
of bits, so is better suited to implementation in hardware than in software.
131:
designed in 2002 by A.A. Moldovyan and N.A. Moldovyan. Like its predecessor,
1547:
928:
923:
813:
727:
622:
602:
1710:
259:
204:
1592:
1552:
1266:
1230:
1024:
687:
562:
542:
454:
182:
174:
61:
933:
883:
843:
833:
778:
773:
617:
426:
1473:
1271:
893:
888:
823:
808:
798:
743:
717:
712:
707:
587:
177:
of 256 bits. Kidney, Heys, and
Norvell showed that round keys of low
989:
948:
898:
878:
863:
652:
632:
552:
517:
838:
747:
662:
657:
647:
627:
499:
484:
1328:
344:
943:
858:
479:
474:
264:
209:
159:
151:
1722:
1494:
Cryptographically secure pseudorandom number generator
332:
1606:
1362:
1290:
1254:
1043:
962:
508:
435:
383:
101:
91:
80:
70:
60:
55:
45:
37:
29:
24:
260:"A Differential Attack on the CIKS-1 Block Cipher"
205:"A Weight Based Attack on the CIKS-1 Block Cipher"
1742:
1340:
356:
8:
19:
169:The designers of CIKS-1 didn't specify any
1749:
1735:
1347:
1333:
1325:
363:
349:
341:
337:
333:
189:of CIKS-1 which uses 2 chosen plaintexts.
249:CS1 maint: multiple names: authors list (
1717:This cryptography-related article is a
258:B. Kidney; H. Heys; T. Norvell (2004).
294:
283:
239:
228:
18:
7:
1707:
1705:
173:for the cipher, but it uses a total
1721:. You can help Knowledge (XXG) by
203:, T. Norvell (November 12, 2003).
14:
33:A.A. Moldovyan and N.A. Moldovyan
1709:
1682:
1681:
1543:Information-theoretic security
318:. Springer. pp. 456–468.
1:
1659:Message authentication code
1614:Cryptographic hash function
1427:Cryptographic hash function
1794:
1704:
1538:Harvest now, decrypt later
187:differential cryptanalysis
1677:
1654:Post-quantum cryptography
1324:
1246:Time/memory/data tradeoff
340:
336:
113:using 2 chosen plaintexts
109:
1644:Quantum key distribution
1634:Authenticated encryption
1489:Random number generation
1034:Whitening transformation
1639:Public-key cryptography
1629:Symmetric-key algorithm
1432:Key derivation function
1392:Cryptographic primitive
1385:Authentication protocol
1375:Outline of cryptography
1370:History of cryptography
1005:Confusion and diffusion
135:, it relies heavily on
1380:Cryptographic protocol
293:Cite journal requires
238:Cite journal requires
1533:End-to-end encryption
1479:Cryptojacking malware
1298:Initialization vector
1773:Broken block ciphers
1649:Quantum cryptography
1573:Trusted timestamping
1077:3-subset MITM attack
693:Intel Cascade Cipher
673:Hasty Pudding cipher
154:. In each round the
142:The algorithm has a
1412:Cryptographic nonce
1116:Differential-linear
111:Differential attack
21:
1778:Cryptography stubs
1518:Subliminal channel
1502:Pseudorandom noise
1449:Key (cryptography)
1189:Differential-fault
407:internal mechanics
1730:
1729:
1699:
1698:
1695:
1694:
1578:Key-based routing
1568:Trapdoor function
1439:Digital signature
1320:
1319:
1316:
1315:
1303:Mode of operation
980:Lai–Massey scheme
117:
116:
1785:
1751:
1744:
1737:
1713:
1706:
1685:
1684:
1513:Insecure channel
1349:
1342:
1335:
1326:
1174:Power-monitoring
1015:Avalanche effect
723:Khufu and Khafre
376:security summary
365:
358:
351:
342:
338:
334:
329:
302:
296:
291:
289:
281:
279:
277:
272:
254:
247:
241:
236:
234:
226:
224:
222:
217:
22:
1793:
1792:
1788:
1787:
1786:
1784:
1783:
1782:
1758:
1757:
1756:
1755:
1702:
1700:
1691:
1673:
1602:
1358:
1353:
1312:
1286:
1255:Standardization
1250:
1179:Electromagnetic
1131:Integral/Square
1088:Piling-up lemma
1072:Biclique attack
1061:EFF DES cracker
1045:
1039:
970:Feistel network
958:
583:CIPHERUNICORN-E
578:CIPHERUNICORN-A
510:
504:
437:
431:
385:
379:
369:
326:
312:
309:
307:Further reading
292:
282:
275:
273:
262:
257:
248:
237:
227:
220:
218:
207:
198:
195:
181:are relatively
38:First published
17:
12:
11:
5:
1791:
1789:
1781:
1780:
1775:
1770:
1760:
1759:
1754:
1753:
1746:
1739:
1731:
1728:
1727:
1714:
1697:
1696:
1693:
1692:
1690:
1689:
1678:
1675:
1674:
1672:
1671:
1666:
1664:Random numbers
1661:
1656:
1651:
1646:
1641:
1636:
1631:
1626:
1621:
1616:
1610:
1608:
1604:
1603:
1601:
1600:
1595:
1590:
1588:Garlic routing
1585:
1580:
1575:
1570:
1565:
1560:
1555:
1550:
1545:
1540:
1535:
1530:
1525:
1520:
1515:
1510:
1508:Secure channel
1505:
1499:
1498:
1497:
1486:
1481:
1476:
1471:
1469:Key stretching
1466:
1461:
1456:
1451:
1446:
1441:
1436:
1435:
1434:
1429:
1419:
1417:Cryptovirology
1414:
1409:
1404:
1402:Cryptocurrency
1399:
1394:
1389:
1388:
1387:
1377:
1372:
1366:
1364:
1360:
1359:
1354:
1352:
1351:
1344:
1337:
1329:
1322:
1321:
1318:
1317:
1314:
1313:
1311:
1310:
1305:
1300:
1294:
1292:
1288:
1287:
1285:
1284:
1279:
1274:
1269:
1264:
1258:
1256:
1252:
1251:
1249:
1248:
1243:
1238:
1233:
1228:
1223:
1218:
1213:
1208:
1203:
1198:
1193:
1192:
1191:
1186:
1181:
1176:
1171:
1161:
1156:
1151:
1146:
1138:
1133:
1128:
1121:Distinguishing
1118:
1113:
1112:
1111:
1106:
1101:
1091:
1081:
1080:
1079:
1074:
1064:
1053:
1051:
1041:
1040:
1038:
1037:
1027:
1022:
1017:
1012:
1007:
1002:
997:
992:
987:
985:Product cipher
982:
977:
972:
966:
964:
960:
959:
957:
956:
951:
946:
941:
936:
931:
926:
921:
916:
911:
906:
901:
896:
891:
886:
881:
876:
871:
866:
861:
856:
851:
846:
841:
836:
831:
826:
821:
816:
811:
806:
801:
796:
791:
786:
781:
776:
771:
766:
761:
756:
751:
740:
735:
730:
725:
720:
715:
710:
705:
700:
695:
690:
685:
680:
675:
670:
665:
660:
655:
650:
645:
640:
635:
630:
625:
620:
615:
613:Cryptomeria/C2
610:
605:
600:
595:
590:
585:
580:
575:
570:
565:
560:
555:
550:
545:
540:
535:
530:
525:
520:
514:
512:
506:
505:
503:
502:
497:
492:
487:
482:
477:
472:
467:
462:
457:
452:
447:
441:
439:
433:
432:
430:
429:
424:
419:
414:
400:
395:
389:
387:
381:
380:
370:
368:
367:
360:
353:
345:
331:
330:
324:
308:
305:
304:
303:
295:|journal=
255:
240:|journal=
194:
191:
179:Hamming weight
164:addition mod 4
148:Feistel cipher
115:
114:
107:
106:
99:
98:
95:
89:
88:
82:
78:
77:
74:
68:
67:
64:
58:
57:
53:
52:
47:
43:
42:
39:
35:
34:
31:
27:
26:
15:
13:
10:
9:
6:
4:
3:
2:
1790:
1779:
1776:
1774:
1771:
1769:
1768:Block ciphers
1766:
1765:
1763:
1752:
1747:
1745:
1740:
1738:
1733:
1732:
1726:
1724:
1720:
1715:
1712:
1708:
1703:
1688:
1680:
1679:
1676:
1670:
1669:Steganography
1667:
1665:
1662:
1660:
1657:
1655:
1652:
1650:
1647:
1645:
1642:
1640:
1637:
1635:
1632:
1630:
1627:
1625:
1624:Stream cipher
1622:
1620:
1617:
1615:
1612:
1611:
1609:
1605:
1599:
1596:
1594:
1591:
1589:
1586:
1584:
1583:Onion routing
1581:
1579:
1576:
1574:
1571:
1569:
1566:
1564:
1563:Shared secret
1561:
1559:
1556:
1554:
1551:
1549:
1546:
1544:
1541:
1539:
1536:
1534:
1531:
1529:
1526:
1524:
1521:
1519:
1516:
1514:
1511:
1509:
1506:
1503:
1500:
1495:
1492:
1491:
1490:
1487:
1485:
1482:
1480:
1477:
1475:
1472:
1470:
1467:
1465:
1462:
1460:
1459:Key generator
1457:
1455:
1452:
1450:
1447:
1445:
1442:
1440:
1437:
1433:
1430:
1428:
1425:
1424:
1423:
1422:Hash function
1420:
1418:
1415:
1413:
1410:
1408:
1405:
1403:
1400:
1398:
1397:Cryptanalysis
1395:
1393:
1390:
1386:
1383:
1382:
1381:
1378:
1376:
1373:
1371:
1368:
1367:
1365:
1361:
1357:
1350:
1345:
1343:
1338:
1336:
1331:
1330:
1327:
1323:
1309:
1306:
1304:
1301:
1299:
1296:
1295:
1293:
1289:
1283:
1280:
1278:
1275:
1273:
1270:
1268:
1265:
1263:
1260:
1259:
1257:
1253:
1247:
1244:
1242:
1239:
1237:
1234:
1232:
1229:
1227:
1224:
1222:
1219:
1217:
1214:
1212:
1209:
1207:
1204:
1202:
1201:Interpolation
1199:
1197:
1194:
1190:
1187:
1185:
1182:
1180:
1177:
1175:
1172:
1170:
1167:
1166:
1165:
1162:
1160:
1157:
1155:
1152:
1150:
1147:
1145:
1144:
1139:
1137:
1134:
1132:
1129:
1126:
1122:
1119:
1117:
1114:
1110:
1107:
1105:
1102:
1100:
1097:
1096:
1095:
1092:
1089:
1085:
1082:
1078:
1075:
1073:
1070:
1069:
1068:
1065:
1062:
1058:
1055:
1054:
1052:
1049:
1048:cryptanalysis
1042:
1035:
1031:
1030:Key whitening
1028:
1026:
1023:
1021:
1018:
1016:
1013:
1011:
1008:
1006:
1003:
1001:
998:
996:
993:
991:
988:
986:
983:
981:
978:
976:
973:
971:
968:
967:
965:
961:
955:
952:
950:
947:
945:
942:
940:
937:
935:
932:
930:
927:
925:
922:
920:
917:
915:
912:
910:
907:
905:
902:
900:
897:
895:
892:
890:
887:
885:
882:
880:
877:
875:
872:
870:
867:
865:
862:
860:
857:
855:
852:
850:
847:
845:
842:
840:
837:
835:
832:
830:
827:
825:
822:
820:
819:New Data Seal
817:
815:
812:
810:
807:
805:
802:
800:
797:
795:
792:
790:
787:
785:
782:
780:
777:
775:
772:
770:
767:
765:
762:
760:
757:
755:
752:
749:
745:
741:
739:
736:
734:
731:
729:
726:
724:
721:
719:
716:
714:
711:
709:
706:
704:
701:
699:
696:
694:
691:
689:
686:
684:
681:
679:
676:
674:
671:
669:
666:
664:
661:
659:
656:
654:
651:
649:
646:
644:
641:
639:
636:
634:
631:
629:
626:
624:
621:
619:
616:
614:
611:
609:
606:
604:
601:
599:
596:
594:
591:
589:
586:
584:
581:
579:
576:
574:
571:
569:
566:
564:
561:
559:
558:BEAR and LION
556:
554:
551:
549:
546:
544:
541:
539:
536:
534:
531:
529:
526:
524:
521:
519:
516:
515:
513:
507:
501:
498:
496:
493:
491:
488:
486:
483:
481:
478:
476:
473:
471:
468:
466:
463:
461:
458:
456:
453:
451:
448:
446:
443:
442:
440:
434:
428:
425:
423:
420:
418:
415:
412:
408:
404:
401:
399:
396:
394:
391:
390:
388:
382:
377:
373:
372:Block ciphers
366:
361:
359:
354:
352:
347:
346:
343:
339:
335:
327:
325:9783540001645
321:
317:
311:
310:
306:
300:
287:
270:
266:
261:
256:
252:
245:
232:
215:
211:
206:
202:
197:
196:
192:
190:
188:
184:
180:
176:
172:
167:
165:
161:
157:
153:
149:
145:
140:
138:
134:
130:
126:
122:
112:
108:
105:
104:cryptanalysis
100:
96:
94:
90:
87:-like network
86:
83:
79:
75:
73:
69:
65:
63:
59:
56:Cipher detail
54:
51:
48:
44:
40:
36:
32:
28:
23:
1723:expanding it
1716:
1701:
1619:Block cipher
1464:Key schedule
1454:Key exchange
1444:Kleptography
1407:Cryptosystem
1356:Cryptography
1206:Partitioning
1164:Side-channel
1142:
1109:Higher-order
1094:Differential
975:Key schedule
572:
315:
286:cite journal
274:. Retrieved
231:cite journal
219:. Retrieved
171:key schedule
168:
141:
137:permutations
129:block cipher
124:
121:cryptography
118:
102:Best public
46:Derived from
41:January 2002
16:Block cipher
1607:Mathematics
1598:Mix network
1291:Utilization
1277:NSA Suite B
1262:AES process
1211:Rubber-hose
1149:Related-key
1057:Brute-force
436:Less common
199:B. Kidney,
72:Block sizes
1762:Categories
1558:Ciphertext
1528:Decryption
1523:Encryption
1484:Ransomware
1241:Chi-square
1159:Rotational
1099:Impossible
1020:Block size
914:Spectr-H64
738:Ladder-DES
733:Kuznyechik
678:Hierocrypt
548:BassOmatic
511:algorithms
438:algorithms
411:Triple DES
386:algorithms
276:January 3,
269:PostScript
221:January 3,
214:PostScript
193:References
144:block size
133:Spectr-H64
50:Spectr-H64
1548:Plaintext
1216:Black-bag
1136:Boomerang
1125:Known-key
1104:Truncated
929:Threefish
924:SXAL/MBAL
814:MultiSwap
769:MacGuffin
728:KN-Cipher
668:Grand Cru
623:CS-Cipher
603:COCONUT98
81:Structure
62:Key sizes
30:Designers
1687:Category
1593:Kademlia
1553:Codetext
1496:(CSPRNG)
1267:CRYPTREC
1231:Weak key
1184:Acoustic
1025:Key size
869:Red Pike
688:IDEA NXT
568:Chiasmus
563:CAST-256
543:BaseKing
528:Akelarre
523:Adiantum
490:Skipjack
455:CAST-128
450:Camellia
398:Blowfish
175:key size
66:256 bits
1363:General
1308:Padding
1226:Rebound
934:Treyfer
884:SAVILLE
844:PRESENT
834:NOEKEON
779:MAGENTA
774:Madryga
754:Lucifer
618:CRYPTON
427:Twofish
417:Serpent
201:H. Heys
85:Feistel
76:64 bits
25:General
1474:Keygen
1272:NESSIE
1221:Davies
1169:Timing
1084:Linear
1044:Attack
963:Design
954:Zodiac
919:Square
894:SHACAL
889:SC2000
849:Prince
829:Nimbus
824:NewDES
809:MULTI2
799:MISTY1
742:LOKI (
718:KHAZAD
713:KeeLoq
708:KASUMI
703:Kalyna
588:CLEFIA
573:CIKS-1
533:Anubis
384:Common
322:
162:, and
125:CIKS-1
93:Rounds
20:CIKS-1
1504:(PRN)
1154:Slide
1010:Round
995:P-box
990:S-box
949:XXTEA
909:Speck
904:Simon
899:SHARK
879:SAFER
864:REDOC
789:Mercy
748:89/91
698:Iraqi
663:G-DES
653:FEA-M
633:DES-X
598:Cobra
553:BATON
538:Ascon
518:3-Way
509:Other
127:is a
1719:stub
1282:CNSA
1141:Mod
1067:MITM
839:NUSH
794:MESH
784:MARS
658:FROG
648:FEAL
628:DEAL
608:Crab
593:CMEA
500:XTEA
485:SEED
465:IDEA
460:GOST
445:ARIA
320:ISBN
299:help
278:2007
251:link
244:help
223:2007
183:weak
160:XORs
1236:Tau
1196:XSL
1000:SPN
944:xmx
939:UES
874:S-1
859:RC2
804:MMB
683:ICE
638:DFC
495:TEA
480:RC6
475:RC5
470:LEA
422:SM4
403:DES
393:AES
265:PDF
210:PDF
156:key
152:RC5
150:or
119:In
1764::
764:M8
759:M6
746:,
744:97
643:E2
409:,
290::
288:}}
284:{{
235::
233:}}
229:{{
166:.
123:,
1750:e
1743:t
1736:v
1725:.
1348:e
1341:t
1334:v
1143:n
1127:)
1123:(
1090:)
1086:(
1063:)
1059:(
1050:)
1046:(
1036:)
1032:(
854:Q
750:)
413:)
405:(
378:)
374:(
364:e
357:t
350:v
328:.
301:)
297:(
280:.
271:)
267:/
263:(
253:)
246:)
242:(
225:.
216:)
212:/
208:(
97:8
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.