• Title/Summary/Keyword: Differential meet-in-the-middle

Search Result 10, Processing Time 0.02 seconds

Improved Meet-in-the-Middle Attacks on Crypton and mCrypton

  • Cui, Jingyi;Guo, Jiansheng;Huang, Yanyan;Liu, Yipeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2660-2679
    • /
    • 2017
  • Crypton is a SP-network block cipher that attracts much attention because of its excellent performance on hardware. Based on Crypton, mCrypton is designed as a lightweight block cipher suitable for Internet of Things (IoT) and Radio Frequency Identification (RFID). The security of Crypton and mCrypton under meet-in-the-middle attack is analyzed in this paper. By analyzing the differential properties of cell permutation, several differential characteristics are introduced to construct generalized ${\delta}-sets$. With the usage of a generalized ${\delta}-set$ and differential enumeration technique, a 6-round meet-in-the-middle distinguisher is proposed to give the first meet-in-the-middle attack on 9-round Crypton-192 and some improvements on the cryptanalysis of 10-round Crypton-256 are given. Combined with the properties of nibble permutation and substitution, an improved meet-in-the-middle attack on 8-round mCrypton is proposed and the first complete attack on 9-round mCrypton-96 is proposed.

Dynamic Network using Symmetric Block Cipher

  • Park Jong-Min
    • Journal of information and communication convergence engineering
    • /
    • v.3 no.1
    • /
    • pp.5-8
    • /
    • 2005
  • Dynamic cipher has the property that the key-size, the number of round, and the plaintext-size are scalable simultaneously. We present the method for designing secure Dynamic cipher against meet-in-the-middle attack and linear cryptanalysis. Also, we show that the differential cryptanalysis to Dynamic cipher is hard. In this paper we propose a new network called Dynamic network for symmetric block ciphers.

Improved Preimage Attacks on RIPEMD-160 and HAS-160

  • Shen, Yanzhao;Wang, Gaoli
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.727-746
    • /
    • 2018
  • The hash function RIPEMD-160 is a worldwide ISO/IEC standard and the hash function HAS-160 is the Korean hash standard and is widely used in Korea. On the basis of differential meet-in-the-middle attack and biclique technique, a preimage attack on 34-step RIPEMD-160 with message padding and a pseudo-preimage attack on 71-step HAS-160 without message padding are proposed. The former is the first preimage attack from the first step, the latter increases the best pseudo-preimage attack from the first step by 5 steps. Furthermore, we locate the linear spaces in another message words and exchange the bicliques construction process and the mask vector search process. A preimage attack on 35-step RIPEMD-160 and a preimage attack on 71-step HAS-160 are presented. Both of the attacks are from the intermediate step and satisfy the message padding. They improve the best preimage attacks from the intermediate step on step-reduced RIPEMD-160 and HAS-160 by 4 and 3 steps respectively. As far as we know, they are the best preimage and pseudo-preimage attacks on step-reduced RIPEMD-160 and HAS-160 respectively in terms of number of steps.

Dynamic Network: A New Framework for Symmetric Block Cipher Algorithms

  • Park, Seung-Bae;Joo, Nak-Keun;Lim, Hyeong-Seok
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.743-746
    • /
    • 2000
  • In this paper we propose a new network called Dynamic network for symmetric block ciphers. Dynamic cipher has the property that the key-size, the number of round, and the plaintext-size are scalable simultaneously We present the method for designing secure Dynamic cipher against meet-in-the-middle attack and linear cryptanalysis. Also, we show that the differential cryptanalysis to Dynamic cipher is hard.

  • PDF

Symmetric Block Cipher Algorithms Using the Dynamic Network (동적 네트워크를 이용한 대칭블록암호 알고리즘)

  • Park, Jong-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.7
    • /
    • pp.1495-1500
    • /
    • 2011
  • Dynamic cipher has the property that the key-size, the number of round, and the plain text-size are scalable simultaneously. In this paper we propose the block cipher algorithm which is symmetrical in the dynamic network. We present the method for designing secure Dynamic cipher against meet-in-the-middle attack and linear crytanalysis. Also, we show that the differential cryptanalysis to Dynamic cipher is hard.

An Efficient Dynamic Network Security Method based on Symmetric Block Cipher Algorithms (대칭적인 블록 암호화 알고리즘을 기반으로 한 효율적인 다이내믹 네트워크 보안 방법)

  • Song, Byoung-Ho;Yang, Sung-Ki;Bae, Sang-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.169-175
    • /
    • 2008
  • The existing block encryption algorithms have been designed for the encryption key value to be unchanged and applied to the round functions of each block. and enciphered. Therefore, it has such a weak point that the plaintext or encryption key could be easily exposed by differential cryptanalysis or linear cryptanalysis, both are the most powerful methods for decoding block encryption of a round repeating structure. Dynamic cipher has the property that the key-size, the number of round, and the plaintext-size are scalable simultaneously. Dynamic network is the unique network satisfying these characteristics among the networks for symmetric block ciphers. We analyze the strength of Dynamic network for meet-in-the-middle attack, linear cryptanalysis, and differential cryptanalysis. Also, In this paper we propose a new network called Dynamic network for symmetric block ciphers.

  • PDF

Improved Security Analysis of Reduced SMS4 Block Cipher (축소된 SMS4 블록 암호에 대한 향상된 안전성 분석)

  • Kim, Tae-Hyun;Kim, Jong-Sung;Hong, Seok-Hie;Sung, Jae-Chul;Lee, Chang-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.3-10
    • /
    • 2009
  • In this paper, we introduce improved differential and linear attacks on the SMS4 block cipher which is used in the Chinese national standard WAPI (WLAN Authentication and Privacy Infrastructure, WLAN - Wireless Local Area Network): First, we introduce how to extend previously known differential attacks on SMS4 from 20 or 21 to 22 out of the full 32 rounds. Second, we improve a previously known linear attack on 22-round reduced SMS4 from $2^{119}$ known plaintexts, $2^{109}$ memory bytes, $2^{117}$ encryptions to $2^{117}$ known plaintexts, $2^{l09}$ memory bytes, $2^{112.24}$ encryptions, by using a new linear approximation.

An analytical algorithm for assessing dynamic characteristics of a triple-tower double-cable suspension bridge

  • Wen-ming Zhang;Yu-peng Chen;Shi-han Wang;Xiao-fan Lu
    • Structural Engineering and Mechanics
    • /
    • v.90 no.4
    • /
    • pp.325-343
    • /
    • 2024
  • Triple-tower double-cable suspension bridges have increased confinement stiffness imposed by the main cable on the middle tower, which has bright application prospects. However, vertical bending and torsional vibrations of the double-cable and the girder are coupled in such bridges due to the hangers. In particular, the bending vibration of the towers in the longitudinal direction and torsional vibrations about the vertical axis influence the vertical bending and torsional vibrations of the stiffening girders, respectively. The conventional analytical algorithm for assessing the dynamic features of the suspension bridge is not directly applicable to this type of bridge. This study attempts to mitigate this problem by introducing an analytical algorithm for solving the triple-tower double-cable suspension bridge's natural frequencies and mode shapes. D'Alembert's principle is employed to construct the differential equations of the vertical bending and torsional vibrations of the stiffening girder continuum in each span. Vibrations of stiffening girders in each span are interrelated via the vibrations of the main cables and the bridge towers. On this basis, the natural frequencies and mode shapes are derived by separating variables. The proposed algorithm is then applied to an engineering example. The natural frequencies and mode shapes of vertical bending and torsional vibrations derived by the analytical algorithm agreed well with calculations via the finite element method. The fundamental frequency of vertical bending and first- and second-order torsion frequencies of double-cable suspension bridges are much higher than those of single-cable suspension bridges. The analytical algorithm has high computational efficiency and calculation accuracy, which can provide a reference for selecting appropriate structural parameters to meet the requirements of dynamics during the preliminary design.

An Analysis on the Science Gifted Education Recipients' Perception for Education Program using an Importance-Performance Analysis (IPA 기법을 활용한 과학영재교육 수혜자들의 교육프로그램에 대한 인식 분석)

  • Park, Kyeong-Jin;Ryu, Chun-Ryol;Choi, Jinsu;Jung, Hyun-Chul
    • Journal of Gifted/Talented Education
    • /
    • v.26 no.3
    • /
    • pp.427-447
    • /
    • 2016
  • The purpose of this study was to investigate science gifted education recipients' perception through importance-performance analysis regarding gifted education program, and explore reinforcements and improvements for providing an education program to meet the needs of science gifted. For this study, we developed an questionnaire and conducted a survey of 288 university students who had experience of receiving science gifted education. The collected data was analyzed by SPSS 20.0 in order to analyze difference between importance and performance which recipients perceived, paired t-test was conducted. Moreover, to investigate improvements for education program, Importance-Performance Analysis(IPA) was conducted. We deduced the following from the analysis. The performance is in general lower than the importance which recipients perceived regarding experienced education program. There was a differential needs in the type of education program depending on the school level. In other words, they were perceived 'education based on experiences' as effective education program for elementary school students; 'education based on inquiry activities' for middle school students; and 'education based on research activities 'for high school students. But, career education and leadership program was included in domain of urgent improvement regardless to the school level. This study has different signification from previous research in that was analyzed gifted education program considering the splashdown effect.

A Study of the Reduction of Diesel-Engine Emissions for Off-Road Vehicles (비도로 차량용 디젤엔진의 배기가스 저감에 관한 연구)

  • Cho, Gyu-Baek;Kim, Hong-Suk;Kang, Jeong-Ho
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.35 no.6
    • /
    • pp.577-583
    • /
    • 2011
  • To meet the requirements of the Tier 4 interim regulations for off-road vehicles, emissions of particulate matter (PM) and nitrogen oxides (NOx) must be reduced by 95% and 30%, respectively, compared to current regulations. In this research, both the DPF and HPL EGR systems were investigated, with the aim of decreasing the PM and NOx emissions of a 56-kW off-road vehicle. The results of the experiments show that the DOC-DPF system is very useful for reducing PM emissions. It is also found that the back pressure is acceptable, and the rate of power loss is less than 5%. By applying the HPL EGR system to the diesel engine, the NOx emissions under low- and middle-load conditions are reduced effectively because of the high differential pressure between the turbocharger inlet and the intake manifold. The NOx emissions can be decreased by increasing the EGR rate, but total hydrocarbon (THC) emission increases because of the increased fuel consumption needed to compensate for the power loss caused by EGR and DPF.