{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T16:53:44Z","timestamp":1762361624381,"version":"build-2065373602"},"reference-count":14,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T00:00:00Z","timestamp":1702512000000},"content-version":"vor","delay-in-days":347,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072445"],"award-info":[{"award-number":["62072445"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Information Security"],"published-print":{"date-parts":[[2023,1]]},"abstract":"<jats:p>This paper focuses on similarity properties and extension of the classical slide property of block ciphers. Taking FESH, an award\u2010winning block cipher of the National Cryptographic Algorithm Design Competition 2019, as an example, similarity properties of the encryption and key transformation are found, owing to the similar structures that the encryption and key transformation adopted, and the constants generation. Based on the similarity properties, extended slide properties can be constructed for FESH. Slide attacks of FESH are then proposed. The similarity properties and extended slide property are immune to the increasing of iterated rounds, i.e., it cannot be avoided by increasing the round number of FESH. Furthermore, extended slide property helps relaxing the strict requirements of the subkeys in slide attacks. Taking Feistel and SPN structures as examples, frameworks of slide attacks based on the extended slide properties are presented. Slide attack of FESH is exactly a concrete example of SPN structure.<\/jats:p>","DOI":"10.1049\/2023\/7171600","type":"journal-article","created":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T14:50:06Z","timestamp":1702565406000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Similarity Property and Slide Attack of Block Cipher FESH"],"prefix":"10.1049","volume":"2023","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7550-0251","authenticated-orcid":false,"given":"Yafei","family":"Zheng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6244-3489","authenticated-orcid":false,"given":"Wenling","family":"Wu","sequence":"additional","affiliation":[]}],"member":"265","published-online":{"date-parts":[[2023,12,14]]},"reference":[{"key":"e_1_2_11_1_2","first-page":"713","article-title":"On the design of block cipher FESH","volume":"6","author":"Jia K.","year":"2019","journal-title":"Journal of Cryptologic Research"},{"key":"e_1_2_11_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48519-8_18"},{"key":"e_1_2_11_3_2","series-title":"Lecture Notes in Computer Science","first-page":"398","volume-title":"EUROCRYPT 1993","author":"Biham E.","year":"1993"},{"key":"e_1_2_11_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_41"},{"key":"e_1_2_11_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74619-5_10"},{"key":"e_1_2_11_6_2","unstructured":"NRS 009-6-7 Rationalized User Specification Electricity Sales Systems Part 6: Interface standards Section 7: Standard Transfer Specifica-tion\/Credit Dispensing Unit\u2014Electricity dispenser\u2014Token Encoding and Data Encryption and Decryption 2002."},{"key":"e_1_2_11_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40392-7_3"},{"key":"e_1_2_11_8_2","unstructured":"MegeA. Slide attack on CLX-128 Proceedings of the Lightweight Cryptography Workshop 2019 169."},{"key":"e_1_2_11_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36231-2_4"},{"key":"e_1_2_11_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28368-0_7"},{"key":"e_1_2_11_11_2","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2018.9010130"},{"key":"e_1_2_11_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2013.05.012"},{"key":"e_1_2_11_13_2","first-page":"351","volume-title":"IPSI Transaction on Internet Research","author":"Baksi A.","year":"2015"},{"key":"e_1_2_11_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_10"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ietis\/2023\/7171600.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/ietis\/2023\/7171600.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/2023\/7171600","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T16:49:58Z","timestamp":1762361398000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/2023\/7171600"}},"subtitle":[],"editor":[{"given":"Taimur","family":"Bakhshi","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2023,1]]},"references-count":14,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["10.1049\/2023\/7171600"],"URL":"https:\/\/doi.org\/10.1049\/2023\/7171600","archive":["Portico"],"relation":{},"ISSN":["1751-8709","1751-8717"],"issn-type":[{"type":"print","value":"1751-8709"},{"type":"electronic","value":"1751-8717"}],"subject":[],"published":{"date-parts":[[2023,1]]},"assertion":[{"value":"2023-07-28","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-21","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-12-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"7171600"}}