Next Article in Journal
Generating Functions for Orthogonal Polynomials of A2, C2 and G2
Previous Article in Journal
PUF Based Authentication Protocol for IoT
Article Menu
Issue 8 (August) cover image

Export Article

Open AccessArticle
Symmetry 2018, 10(8), 353; https://doi.org/10.3390/sym10080353

Cryptanalysis on SDDO-Based BM123-64 Designs Suitable for Various IoT Application Targets

Department of Computer Science and Engineering, Seoul National University of Science and Technology, Gongneung-ro, Nowon-gu, Seoul 01811, Korea
*
Author to whom correspondence should be addressed.
Received: 28 June 2018 / Revised: 25 July 2018 / Accepted: 17 August 2018 / Published: 20 August 2018
(This article belongs to the Special Issue Symmetry-Adapted Machine Learning for Information Security)
Full-Text   |   PDF [2090 KB, uploaded 20 August 2018]   |  

Abstract

BM123-64 block cipher, which was proposed by Minh, N.H. and Bac, D.T. in 2014, was designed for high speed communication applications factors. It was constructed in hybrid controlled substitution–permutation network (CSPN) models with two types of basic controlled elements (CE) in distinctive designs. This cipher is based on switchable data-dependent operations (SDDO) and covers dependent-operations suitable for efficient primitive approaches for cipher constructions that can generate key schedule in a simple way. The BM123-64 cipher has advantages including high applicability, flexibility, and portability with different algorithm selection for various application targets with internet of things (IoT) as well as secure protection against common types of attacks, for instance, differential attacks and linear attacks. However, in this paper, we propose methods to possibly exploit the BM123-64 structure using related-key attacks. We have constructed a high probability related-key differential characteristics (DCs) on a full eight rounds of BM123-64 cipher. The related-key amplified boomerang attack is then proposed on all three different cases of operation-specific designs with effective results in complexity of data and time consumptions. This study can be considered as the first cryptographic results on BM123-64 cipher. View Full-Text
Keywords: BM123-64; hybrid controlled substitution–permutation network (CSPN); switchable data-dependent operations (SDDOs); cryptanalysis; related-key amplified boomerang attack BM123-64; hybrid controlled substitution–permutation network (CSPN); switchable data-dependent operations (SDDOs); cryptanalysis; related-key amplified boomerang attack
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Phuc, T.S.D.; Lee, C. Cryptanalysis on SDDO-Based BM123-64 Designs Suitable for Various IoT Application Targets. Symmetry 2018, 10, 353.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Symmetry EISSN 2073-8994 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top