Cryptanalysis

  • Domestic Papers

[24] Juheon Kim, Sieun Kim, Jonghyun Park, Seungjun Baek, Jongsung Kim, “Trends of Security Analysis of the Candidate Algorithm HyENA Selected by NIST Lightweight Cryptography Standardization Project“, Conference on Information Security and Cryptography-Winter, 2020.

[23] Soobin Kim, Soeun Kim, Sehee Cho, Seungjun Baek, Jongsung Kim, “Trends of Security Analysis of the Candidate Algorithm COMET Selected by NIST Lightweight Cryptography Standardization Project“, Conference on Information Security and Cryptography-Winter, 2020.

[22] Seungjun Baek, Jonghyun Park, Jongsung Kim, “Shifting Retracing Boomerang Attack on ARIA”, Conference on Information Security and Cryptography-Winter, 2020.

[21] Seungjun Baek, Yongjin Jeon, Hangi Kim, Jongsung Kim, “Trends of NIST Lightweight Cryptography Standardization Process“, Review of KIISC, 2020.

[20] Jonghyeok Lee, Jonghyun Park, Seungjun Baek, Jongsung Kim, “Differential-Linear Cryptanalysis on Reduced rounds of PRESENT applying DLCT”, Conference on Information Security and Cryptography-Summer, 2020.

[19] Sehee Cho, Seungjun Baek, Jongsung Kim, “Differential-Linear cryptanalysis of 12round RECTANGLE-80 using DLCT”, Conference on Information Security and Cryptography-Summer, 2020.

[18] Seungjun Baek, Hangi Kim, Jongsung Kim, “Development and Security Analysis of GIFT-64-Variant That Can Be Efficiently Implemented by Bit-Slice Technique”, Journal of the Korea Institute of Information Security & Cryptology, Vol 30(3), pp. 349-356, 2020.

[17] Seungjun Baek, Hangi Kim, Jongsung Kim, “Security Analysis of Related-Key Rectangle Attack on the Block Cipher HIGHT with Optimal Shuffle“,  Journal of Digital Contents Society, Vol 4(1), pp. 1-4, 2020.

[16] Seungjun Baek, Yongbeom Kim, Yongjin Jeon, Jongsung Kim, “Analysis of Structure Used in 2-Round Candidates Selected by NIST Lightweight Cryptography Standardization Project”, Conference on Information Security and Cryptography-Winter, 2019.

[15] Jingyo Song, Jonghyeok Lee, Bosun Park, Yongjin Jeon, Jongsung Kim, “Security Analysis of AEADs Eliminated in 1-Round Candidates by NIST Lightweight Cryptography Standardization Project”, Conference on Information Security and Cryptography-Winter, 2019.

[14] Jonghyeok Lee, Wonil Kim, Jeongmin Han, Yongjin Jeon, Jongsung Kim, “Trends of Lightweight Block Ciphers”, Conference on Information Security and Cryptography-Winter, 2019.

[13] YongJin Jeon, Giyoon Kim, Hangi Kim, Jongsung Kim, “How to Construct an 8-bit S-box with Differential, Linear Branch Numbers of 3”, Conference on Information Security and Cryptography-Summer, 2019.

[12] Yongjin Jeon, JongHyeok Lee, Seokwon Park, Hyeongjoon Yun, YeLim Choi, Gyunglan Kim, Taejin Park, Jo EunYoung , “Differential and Linear Cryptanalysis on PRINCE Block Cipher Using MILP”, Conference on Information Security and Cryptography-Winter, 2018.

[11] Giyoon Kim, Eunhu Park, Jonghyeok Lee, Sungwoo Jang, Jihun Kim, Hangi Kim, Jongsun Kim,  “Key Recovery Attacks on Zorro Using Related-Key Differential Characteristics, and Collision Attacks on PGV-Zorro”, Journal of The Korea Institute of Information Security & Cryptology, VOL.28, No.5, pp.1059-1070, 2018.

[10] Hangi Kim, Jongsung Kim, “Key Recovery Attacks on Fantomas and Robin Using Related-Key Differentials”, Conference on Information Security and Cryptography-Summer, VOL.28, NO.4, pp. 803-807, 2018.

[9] Min woo Son, Sang ink Lee, Yun gyeom Bea, Hangi Kim, Jihun Kim, Jongsung Kim, “PPTP Authentication Protocol Trend Analysis”, The Workshop of Digital Forensics, 2017.

[8] Jihun Kim, Kiwon Hong, Soram Kim, Jaehyung Cho, Jongsung Kim, “Side Channel Attacks on SIMON Family with Reduced Masked Rounds”, Journal of The Korea Institute of Information Security & Cryptology, VOL.27, NO.4, pp.923-941, 2017.

[7] Dowon Kim, Jongsung Kim, “Analysis of the Efficiency for Some Selected Double-Block-Length Hash Functions Based on AES/LEA”, Journal of The Korea Institute of Information Security & Cryptology,  VOL.26,  NO.6,  pp.1353-1360, 2016.

[6] Jooyoung Lee, Jongsung Kim, “A Preimage Attack on the MJH Hash Function”, Journal of The Korea Institute of Information Security & Cryptology, VOL.26, NO.2, pp. 315-318, 2016.

[5] Kimmon Kim, Myungseo Park, Jongsung Kim, Changhoon Lee, Dukjae Moon, Seokhee Hong, “Safety Analysis of Various Padding Techniques on Padding Oracle Attack”, Journal of The Korea Institute of Information Security & Cryptology, VOL.25, NO.2, pp. 271-278, 2015.

[4] Myungseo Park, Jongsung Kim, “Side-Channel Attacks on LEA with reduced masked rounds”, Journal of The Korea Institute of Information Security & Cryptology, VOL.25, NO.2, pp.253-260, 2015.

[3] Seongjin Hwang, Myungseo Park, Dukjae Moon, Hyungchul Kang, Jongsung Kim, Changhoon Lee, “Analysis of Padding Oracle Attack Possibility about Application Environment; SRTP, MIKEY, CMS, IPSec, TLS, IPTV”KIPS Transactions on Computer and Communication Systems, VOL. 4, NO.2, pp. 73-80, 2015.

[2] Myungseo Park, Jongsung Kim, “Differential Fault Analysis of the Block Cipher LEA”, Journal of The Korea Institute of Information Security & Cryptology, VOL.24, NO.6,  pp.1117-1127, 2014.

[1] Wangho Ju, Hyunjung An, Okyeon Yi, Ju-Sung Kang,  Jongsung Kim, “Improved Related-key Attack against Recent Lightweight Block Cipher PRINCE”, Journal of The Korea Institute of Information Security & Cryptology, VOL.24, NO.3, pp. 445-452, 2014.

  • International Papers

[54] Hangi Kim, Myungseo Park, Jaehyung Cho, Jihun Kim, Jongsung Kim, “Weaknesses of Some Lightweight Blockciphers Suitable for IoT Systems and Their Applications in Hash Modes”, Peer-to-Peer Networking and Applications (I.F 2.397), 2018

[53] Hangi Kim , Do-won Kim , Okyeon Yi, Jongsung Kim, “Cryptanalysis of Hash Functions Based on Blockciphers Suitable for IoT Service Platform Security”, Multimedia Tools and Applications (I.F 2.101), Vol. 78(3), pp.3107-3130, 2019.

[52] Hangi Kim, Jongsung Kim, “Collision Attacks on PGV models Instantiated with Robin Suitable for Lightweight Platforms”, Platform Technology Letters,  Vol. 4,  2017

[51] Deukjo Hong, Dong-Chan Kim, Daesung Kwon, Jongsung Kim, “Improved preimage attacks on hash modes of 8-round AES-256“, Multimedia Tools and Applications (I.F 2.101), 75(22) pp. 14525-14539, 2016.

[50] Yuseop Lee, Jongsung Kim, Seokhie Hong, “Side-channel attacks on HIGHT with reduced masked rounds suitable for the protection of multimedia computing system”, Multimedia Tools and Applications (I.F 2.101), Vol. 56(2), pp. 267-280, Springer, 2012.

[49] Jiqiang Lu, Yongzhuang Wei, Pierre-Alain Fouque, Jongsung Kim, “Cryptanalysis of Reduced Versions of the Camellia Block Cipher”, IET Information Security (I.F 0.949), Vol. 6(3), pp. 228-238, IET, 2012.

[48] Yuseop Lee, Jongsung Kim, Seokhie Hong, Changhoon Lee, “Improved Differential Fault Analysis on Block Cipher SEED-128”, Proceedings of NBiS 2012pp. 675-680, Conference Publishing Services of IEEE Computer Society, 2012.

[47] Jiqiang Lu,Yongzhuang Wei,Jongsung Kim, Enes Pasalic, “The higher-order meet-in-the-middle attack and its application to the Camellia block cipher”, Theoretical Computer Science (I.F 0.718), Vol 527, pp. 102-122, Elsevier, 2014.

[46] Jongsung Kim, “On the security of the block cipher GOST suitable for the protection in U-business services”, Personal and Ubiquitous Computing (I.F 1.735), vol. 17(7), pp. 1429-1435, 2013.

[45] Jongsung Kim, Seokhie Hong, Bart Preneel, Eli Biham, Orr Dunkelman, Nathan Keller, “Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis”, IEEE Transactions on Information Theory (I.F 3.215), Vol. 58, No. 7, pp. 4948-4966, 2012.

[44] Deukjo Hong, Dong-Chan Kim, Woo-Hwan Kim, Jongsung Kim, “Higher order eTCR hash functions”, Computers and Mathematics with Applications (I.F 2.811), Vol. 65, No. 9, pp. 1396-1402, 2013.

[43] Jongsung Kim, “Study on the security of the extended version for the ISO/IEC international standardized block cipher SEED”, Security and Communication Networks (I.F 1.376), Vol. 5, Issue 10, pp. 1141-1146, 2012.

[42] Jongsung Kim, Jaechul Sung, Ermaliza Razali, Raphael C.-W. Phan, Marc Joye, “Notions and Relations for RKA-Secure Permutation and Function Families”, Designs, Codes and Cryptography, Vol. 60(1), pp. 15-35, 2011.

[41] Changhoon Lee, Jongsung Kim, Jaechul Sung, Yang-Sun Lee, Changhoon Lee, “Cryptanalysis of CIKS-128 and CIKS-128h Suitable for Intelligent Multimedia and Ubiquitous Computing Systems”, Journal of Computing And Informatics, Vol. 30(3), pp. 447-466, 2011.

[40] Yuseop Lee, Jongsung Kim, Pil Joong Lee, Yeonjung Kang, Hyangjin Lee, “Impossible Collision Based Side-Channel Attacks on HIGHT with Reduced Masked Rounds”, Proceedings of CSA 2009, pp. 35-39, 2009.

[39] Jongsung Kim, Yuseop Lee, Sangjin Lee, “DES with any Reduced Masked Rounds is not Secure against Side-Channel Attacks”, Computers and Mathematics with Applications (I.F 2.811), Vol. 60, No. 2, pp. 347-354, 2010.

[38] Raphael C.-W. Phan, Geong-Sen Poh, Bok-Min Goi, Jongsung Kim, “Analysis of a Secure Buyer-Seller Watermarking Protocol Proper for Intelligent Environments”, Wireless Personal Communications, Vol. 56 (1), pp. 73-83, 2011.

[37] Jongsung Kim, Seokhie Hong, Jongin Lim, “Impossible Differential Cryptanalysis Using Matrix Method”, Discrete Mathematics, Vol. 310, No. 5, pp. 988-1002, 2010.

[36] Jongsung Kim, Seokhie Hong, Dong-Guk Han, Sangjin Lee, “Improved Side-Channel Analysis of DES with Reduced Masked Rounds”, ETRI Journal, Vol.31, No.5, pp. 625-627, 2009.

[35] Jongsung Kim and Seokhie Hong, “Side-Channel Attack Using Meet-in-the-Middle Technique”,  The Computer Journal, Vol. 53(7), pp. 934-938, 2010.

[34] Kitae Jung, Changhoon Lee, Jongsung Kim, Seokhie Hong and Jongin Lim, “Security Analysis of SCO-Family Using Their Key Schedules”, Information Sciences, Vol.179, No.24, pp. 4232-4242, 2008.

[33] Changhoon Lee, Jongsung Kim, Seokhie Hong, Yang-Sun Lee, “Security Analysis of the Full-round CHESS-64 Cipher Suitable for Pervasive Computing Environments”, Journal of Universal Computer Science, Vol.15, No.5, pp. 1007-1022, 2009.

[32] Deok Gyu Lee, Jongsung Kim, Jaechul Sung, Jeong Bae Lee, and Kee Wook Rim, “Cryptanalysis of Block-Wise Stream Ciphers Suitable for the Protection of Multimedia and Ubiquitous Systems”, Journal of Telecommunication Systems, Vol. 44(3-4), pp. 297-306, 2010.

[31] Jongsung Kim and Raphael C.-W. Phan, “Comprehensive Security Analysis of the Skipjack Encryption Algorithm”, Cryptologia, Vol.33, No.3, pp. 246-270, 2009.

[30] Jiqiang Lu, Orr Dunkelman, Nathan Keller and Jongsung Kim, “New Impossible Differential Attacks on AES”, Proceedings of INDOCRYPT 2008, LNCS 5365, pp. 279-293, Springer-Verlag, 2008.

[29] Jongsung Kim, Changhoon Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee and Jongin Lim, “Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis”, IEICE Transactions – Fundamentals of Electronics, Communications and Computer Sciences, Vol.E-91A, No.10, pp. 3047-3058, 2008.

[28] Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung and Sangjin Lee, “Security Analysis of the Full-Round DDO-64 Block Cipher”, Journal of Systems and Software, Vol.81, No.12, pp. 2328-2335, 2008.

[27] Jiqiang Lu and Jongsung Kim, “Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis”, IEICE Transactions – Fundamentals of Electronics, Communications and Computer Sciences, Vol.E-91A, No.9, pp. 2588-2596, 2008.

[26] Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong, “Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL”, Proceedings of FSE 2008, LNCS 5086, pp. 189-206, Springer-Verlag, 2008.

[25] Jiqiang Lu, Jongsung Kim, Nathan Keller and Orr Dunkelman, “Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1″, Proceedings of CT-RSA 2008, LNCS 4964, pp. 370-386, Springer-Verlag, 2008.

[24] Eunjin Lee, Jongsung Kim, Deukjo Hong, Changhoon Lee, Jaechul Sung, Seokhie Hong and Jongin Lim, “Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang attacks”, IEICE Transactions – Fundamentals of Electronics, Communications and Computer Sciences, Vol.E-91A, No.2, pp. 642-649, 2008.

[23] Jongsung Kim, Seokhie Hong and Bart Preneel, “Related-Key Rectangle Attacks on Reduced AES-192 and AES-256”,  Proceedings of FSE 2007, LNCS 4593, pp. 225-241, Springer-Verlag, 2007.

[22] Orr Dunkelman, Nathan Keller and Jongsung Kim, “Related-Key Rectangle Attack on the Full SHACAL-1”, Proceedings of SAC 2006, LNCS 4356, pp. 28-44, Springer-Verlag, 2006.

[21] Jiqiang Lu, Jongsung Kim, Nathan Keller and Orr Dunkelman, “Differential and Rectangle Attacks on Reduced-Round SHACAL-1”, Proceedings of INDOCRYPT 2006, LNCS 4329, pp. 17-31, Springer-Verlag, 2006.

[20] Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bon-Seok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim and Seongtaek Chee, “HIGHT: A New Block Cipher Suitable for Low-Resource Device”,  Proceedings of CHES 2006, LNCS 4249, pp. 46-59, Springer-Verlag, 2006.

[19] Jiqiang Lu, Changhoon Lee and Jongsung Kim, “Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b”, Proceedings of SCN 2006, LNCS 4116, pp. 95-110, Springer-Verlag, 2006.

[18] Jongsung Kim, Alex Biryukov, Bart Preneel and Seokhie Hong, “On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1”, Proceedings of SCN 2006, LNCS 4116, pp. 242-256, Springer-Verlag, 2006.

[17] Jiqiang Lu, Jongsung Kim, Nathan Keller and Orr Dunkelman, “Related-Key Rectangle Attack on 42-Round SHACAL-2”, Proceedings of ISC 2006, LNCS 4176, pp. 85-100, Springer-Verlag, 2006.

[16] Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, and Sangjin Lee, “Forgery and Key Recovery Attacks on PMAC and Mitchell’s TMAC Variant”, Proceedings of ACISP 2006, LNCS 4058, pp. 421-431, Springer-Verlag, 2006.

[15] Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, and Sangjin Lee, “Provable Security for an RC6-like Structure and a MISTY-FO-like Structure against Differential Cryptanalysis”,  Proceedings of ICCSA 2006, LNCS 3982, pp. 446-455, Springer-Verlag, 2006.

[14] Jongsung Kim, Alex Biryukov, Bart Preneel, and Sangjin Lee, “On the Security of Encryption Modes of MD4, MD5 and HAVAL”, Proceedings of ICICS 2005, LNCS 3783, pp. 147-158, Springer-Verlag, 2005.

[13] Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, and Dukjae Moon, “Related-Key Differential Attacks on Cobra-H64 and Cobra-H128”, Proceedings of CCC 2005, LNCS 3796, pp. 201-219, Springer-Verlag, 2005.

[12] Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, and Sangjin Lee, “Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b”, Proceedings of Mycrypt 2005, LNCS 3715, pp. 244-262, Springer-Verlag, 2005.

[11] Jaechul Sung, Jongsung Kim, Changhoon Lee, and Seokhie Hong, “Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds”, Proceedings of WEWoRC 2005, Lecture Notes in Informatics (LNI 74), pp. 64-75, 2005.

[10] Jaemin Choi, Jongsung Kim, Jaechul Sung, Sangjin Lee, and Jongin Lim, “Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE”, Proceedings of ICCSA 2005, LNCS 3481, pp.567-576, Springer-Verlag, 2005.

[9] Seokhie Hong, Jongsung Kim, Sangjin Lee, and Bart Preneel, “Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192”, Proceedings of FSE 2005, LNCS 3557, pp. 368-383, Springer-Verlag, 2005.

[8] Taekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangin Lee, and Dowon Hong, “Padding Oracle Attacks on Multiple Modes of Operation”, Proceedings of ICISC 2004, LNCS 3506, pp. 343-351, Springer-Verlag, 2004.

[7] Jongsung Kim, Guil Kim, Sangjin Lee, Jongin Lim, and Junghwan Song, “Related-Key Attacks on Reduced Rounds of SHACAL-2”, Proceedings of INDOCRYPT 2004, LNCS 3348, pp.175-189, Springer-Verlag, 2004.

[6] Yongsup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, and Sangjin Lee, “Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2”, Proceedings of ACISP 2004, LNCS 3108, pp. 110-122, Springer-Verlag, 2004.

[5] Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, and Dowon Hong, “The Related-Key Rectangle Attack – Application to SHACAL-1”, Proceedings of ACISP 2004, LNCS 3108, pp. 123-136, Springer-Verlag, 2004.

[4] Jongsung Kim, Seokhie Hong, Sangjin Lee, Junghwan Song, and Hyungjin Yang, “Truncated Differential Attacks on 8-Round CRYPTON”, Proceedings of ICISC 2003, LNCS 2971, pp. 446-456, Springer-Verlag, 2004.

[3] Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, and Sangjin Lee, “Impossible Differential Attack on 30-round SHACAL-2”,  Proceedings of INDOCRYPT 2003, LNCS 2904, pp. 97-106, Springer-Verlag, 2003.

[2] Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee, Jongin Lim, and Soohak Sung, “Impossible Differential Cryptanalysis for Block Cipher Structures”, Proceedings of INDOCRYPT 2003, LNCS 2904, pp. 82-96, Springer-Verlag, 2003.

[1] Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, and Seokwon Jung, “Amplified Boomerang Attack against Reduced-Round SHACAL” Advances in Cryptology – Proceedings of ASIACRYPT 2002, LNCS 2501, pp. 243-253, Springer-Verlag, 2002.