Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Joo Yeon Cho is active.

Publication


Featured researches published by Joo Yeon Cho.


the cryptographers track at the rsa conference | 2010

Linear cryptanalysis of reduced-round PRESENT

Joo Yeon Cho

PRESENT is a hardware-oriented block cipher suitable for resource constrained environment. In this paper we analyze PRESENT by the multidimensional linear cryptanalysis method. We claim that our attack can recover the 80-bit secret key of PRESENT up to 25 rounds out of 31 rounds with around 262.4 data complexity. Furthermore, we showed that the 26-round version of PRESENT can be attacked faster than key exhaustive search with the 264 data complexity by an advanced key search technique. Our results are superior to all the previous attacks. We demonstrate our result by performing the linear attacks on reduced variants of PRESENT. Our results exemplify that the performance of the multidimensional linear attack is superior compared to the classical linear attack.


fast software encryption | 2009

Multidimensional Extension of Matsui's Algorithm 2

Miia Hermelin; Joo Yeon Cho; Kaisa Nyberg

Matsuis one-dimensional Alg. 2 can be used for recovering bits of the last round key of a block cipher. In this paper a truly multidimensional extension of Alg. 2 based on established statistical theory is presented. Two possible methods, an optimal method based on the log-likelihood ratio and a ? 2-based goodness-of-fit test are compared in theory and by practical experiments on reduced round Serpent. The theory of advantage by Selcuk is generalised in multiple dimensions and the advantages and data, time and memory complexities for both methods are derived.


australasian conference on information security and privacy | 2008

Multidimensional Linear Cryptanalysis of Reduced Round Serpent

Miia Hermelin; Joo Yeon Cho; Kaisa Nyberg

Various authors have previously presented different approaches how to exploit multiple linear approximations to enhance linear cryptanalysis. In this paper we present a new truly multidimensional approach to generalise Matsuis Algorithm 1. We derive the statistical framework for it and show how to calculate multidimensional probability distributions based on correlations of one-dimensional linear approximations. The main advantage is that the assumption about statistical independence of linear approximations can be removed. Then we apply these new techniques to four rounds of the block cipher Serpent and show that the multidimensional approach is more effective in recovering key bits correctly than the previous methods that use a multiple of one-dimensional linear approximations.


fast software encryption | 2004

Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering

Joo Yeon Cho; Josef Pieprzyk

This paper presents algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. For unstuttered SOBER-t32, two different attacks are implemented. In the first attack, we obtain multivariate equations of degree 10. Then, an algebraic attack is developed using a collection of output bits whose relation to the initial state of the LFSR can be described by low-degree equations. The resulting system of equations contains 2^69 equations and monomials, which can be solved using the Gaussian elimination with the complexity of 2^196.5. For the second attack, we build a multivariate equation of degree 14. We focus on the property of the equation that the monomials which are combined with output bit are linear. By applying the Berlekamp-Massey algorithm, we can obtain a system of linear equations and the initial states of the LFSR can be recovered. The complexity of attack is around O(2^100) with 2^92 keystream observations. The second algebraic attack is applicable to SOBER-t16 without stuttering. The attack takes around O(2^85) CPU clocks with 2^78 keystream observations.


international conference on information security and cryptology | 2009

A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent

Joo Yeon Cho; Miia Hermelin; Kaisa Nyberg

In this paper, we present a new technique for Matsuis algorithm 2 using multidimensional linear approximation. We show that the data complexity of the attack can be reduced significantly by our method even when the linear hull effect is present. We apply our method to the key recovery attack on 5-round Serpent and demonstrate that our attack is superior to previous attacks. We present evidence that it is theoretically possible to reduce the data complexity of the linear attack against 10 round Serpent by factor of 220 when multiple approximations are used.


international conference on information security and cryptology | 2009

Improved linear cryptanalysis of SOSEMANUK

Joo Yeon Cho; Miia Hermelin

The SOSEMANUK stream cipher is one of the finalists of the eSTREAM project. In this paper, we improve the linear cryptanalysis of SOSEMANUK presented in Asiacrypt 2008. We apply the generalized linear masking technique to SOSEMANUK and derive many linear approximations holding with the correlations of up to 2-25.5. We show that the data complexity of the linear attack on SOSEMANUK can be reduced by a factor of 210 if multiple linear approximations are used. Since SOSEMANUK claims 128-bit security, our attack would not be a real threat on the security of SOSEMANUK.


Proceedings of the First International Workshop | 2008

An Improved Distinguisher for Dragon

Joo Yeon Cho; Josef Pieprzyk

Dragon stream cipher is one of the focus ciphers which have reached Phase 2 of the eSTREAMproject. In this paper, we present a new method of building a linear distinguisher for Dragon. The distinguisher is constructed by exploiting the biases of two S-boxes and the modular addition which are basic components of the nonlinear function F. The bias of the distinguisher is estimated to be around 2−75.32 which is better than the bias of the distinguisher presented by Englund and Maximov. We have shown that Dragon is distinguishable from a random cipher by using around 2150.6 keystream words and 259 memory. In addition, we present a very efficient algorithm for computing the bias of linear approximation of modular addition.


Science & Engineering Faculty | 2006

Formal analysis of card-based payment systems in mobile devices

Vijayakrishnan Pasupathinathan; Josef Pieprzyk; Huaxiong Wang; Joo Yeon Cho


dagstuhl seminar proceedings | 2009

Statistical Tests for Key Recovery Using Multidimensional Extension of Matsui's Algorithm 1

Miia Hermelin; Joo Yeon Cho; Kaisa Nyberg


Lecture Notes in Computer Science | 2006

Distinguishing attack on SOBER-128 with linear masking

Joo Yeon Cho; Josef Pieprzyk

Collaboration


Dive into the Joo Yeon Cho's collaboration.

Top Co-Authors

Avatar

Josef Pieprzyk

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Miia Hermelin

Helsinki University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Huaxiong Wang

Nanyang Technological University

View shared research outputs
Researchain Logo
Decentralizing Knowledge