• Title/Summary/Keyword: Crypton

Search Result 6, Processing Time 0.017 seconds

Improved Meet-in-the-Middle Attacks on Crypton and mCrypton

  • Cui, Jingyi;Guo, Jiansheng;Huang, Yanyan;Liu, Yipeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2660-2679
    • /
    • 2017
  • Crypton is a SP-network block cipher that attracts much attention because of its excellent performance on hardware. Based on Crypton, mCrypton is designed as a lightweight block cipher suitable for Internet of Things (IoT) and Radio Frequency Identification (RFID). The security of Crypton and mCrypton under meet-in-the-middle attack is analyzed in this paper. By analyzing the differential properties of cell permutation, several differential characteristics are introduced to construct generalized ${\delta}-sets$. With the usage of a generalized ${\delta}-set$ and differential enumeration technique, a 6-round meet-in-the-middle distinguisher is proposed to give the first meet-in-the-middle attack on 9-round Crypton-192 and some improvements on the cryptanalysis of 10-round Crypton-256 are given. Combined with the properties of nibble permutation and substitution, an improved meet-in-the-middle attack on 8-round mCrypton is proposed and the first complete attack on 9-round mCrypton-96 is proposed.

Collision Attacks on Crypton and mCrypton (블록 암호 Crypton, mCrypton에 대한 충돌 공격)

  • Kim, Tae-Woong;Kim, Jong-Sung;Jeong, Ki-Tae;Sung, Jae-Chul;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.53-62
    • /
    • 2009
  • H. Gilbert et al. proposed a collision attack on 7-round reduced Rijndael[5]. Applying this attack, we propose collision attacks on 8-round reduced Crypton, 8-round reduced mCrypton in this paper. Attacks on Crypton requires $2^{161.6}$ time complexity with $2^{96}$ chosen plaintexts, respectively. The attack on mCrypton requires $2^{81.6}$ time complexity with $2^{48}$ chosen plaintexts. These results are the best attacks on Crypton and mCrypton in published literatures.

Security Analysis of Light-weight Block Cipher mCrypton Suitable for Ubiquitous Computing Environment (유비쿼터스 환경에 적합한 경량 블록암호 mCrypton에 대한 안전성 분석)

  • Lee, Chang-Hoon;Lee, Yu-Seop;Sung, Jae-Chul
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.5
    • /
    • pp.644-652
    • /
    • 2009
  • New communication environments such as USN, WiBro and RFID have been realized nowadays. Thus, in order to ensure security and privacy protection, various light-weight block ciphers, e.g., mCrypton, HIGHT, SEA and PRESENT, have been proposed. The block cipher mCrypton, which is a light-weight version of Crypton, is a 64-bit block cipher with three key size options (64 bits, 96 bits, 128 bits). In this paper we show that 8-round mCrypton with 128-bit key is vulnerable to related-key rectangle attack. It is the first known cryptanalytic result on mCrypton. We first describe how to construct two related-key truncated differentials on which 7-round related-key rectangle distinguisher is based and then exploit it to attack 8-round mCrypton. This attack requires $2^{45.5}$dada and $2^{45.5}$time complexities which is faster than exhaustive key search.

  • PDF

<Q|Crypton>: 암호 양자안전성 검증 기술

  • Dooho Choi;Yousung Kang;Sokjoon Lee
    • Review of KIISC
    • /
    • v.33 no.1
    • /
    • pp.7-12
    • /
    • 2023
  • 현존 암호인프라에 대한 양자컴퓨터 위협이 가시화됨에 따라, 다각도의 양자리스크 대응 연구가 이루어지고 있다. 그 중에서 양자컴퓨터 상에서 주어진 암호를 해독하기 위해서 소요되는 양자자원량(큐비트수, 양자게이트수, 수행시간 등)을 계산하여 양자보안강도를 추정하는 양자안전성 검증 기술은 대규모의 큐비트를 컨트롤할 수 있는 범용 양자컴퓨터가 아직 없는 상태에서는 쉽지 않은 기술이라 할 수 있다. 이에, 본 고에서는 암호 양자안전성 검증을 위한 현실적이고 유일한 접근이라 할 수 있는 <Q|Crypton> 기술 개념을 설명하고, 이러한 개념을 바탕으로 개발되고 있는 <Q|Crypton> 플랫폼의 전반적인 설명을 제공하고자 한다. 이러한 <Q|Crypton> 기술은 향후, 효율적이면서 높은 양자 저항성을 가지는 암호를 선별하는 데 있어서 실제적인 기여를 할 것으로 예상되고 있다.

Improved Result on the Pseudorandomness of SPN-type transformations (SPN 블록 암호 구조의 의사 난수성에 대한 향상된 결과)

  • 이원일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.91-99
    • /
    • 2004
  • Iwata et al. analyzed the pseudorandomness of the block cipher Serpent which is a SPN-type transformation. In this parer, we introduce a generalization of the results, which can be applied to any SPN-type transformation. For the purpose, we give several explicit definitions and prove our main theorems. We will also apply our theorems to several SPN-type transformations including Serpent, Crypton and Rijndael.

Innovative Business Model from the Perspective of Digital Cultural Industry -Centered on the Virtual Idol "Hatsune Miku" (디지털 문화 산업의 시각에 따른 혁신적 비즈니스 모델: 가상 아이돌 '하츠네 미쿠'를 중심으로)

  • DOUXIAOWEI, DOUXIAOWEI;Yang, Jonghoon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.823-831
    • /
    • 2021
  • In the Internet age, the digital cultural industry is booming, start-up companies want to win a place in the fiercely competitive red sea market of the Internet, innovative business models have become an important challenge and opportunity for countless companies. Taking the virtual idol "Hatsune Miku" as the example, the analysis is carried out at the levels of technological innovation, value proposition, resource combination, operation process and marketing model. By comparing the differences between the first-generation software Meiko of Crypton and the second-generation software "Hatsune Miku", we will study the components of the business model to explore the characteristics and advantages of this business model, and in-depth operation models and innovations. The analysis is expected to provide a substantial reference for other electronic product and software development companies in their business models.