{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:38Z","timestamp":1740141818893,"version":"3.37.3"},"reference-count":10,"publisher":"SAGE Publications","issue":"9","license":[{"start":{"date-parts":[[2013,9,1]],"date-time":"2013-09-01T00:00:00Z","timestamp":1377993600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,9,1]]},"abstract":"<jats:p> PP-1 is a scalable block cipher which can be implemented on a platform with limited resource. In this paper, we analyze the security of PP-1 by using truncated differential cryptanalysis. As concrete examples, we consider four versions of PP-1, PP-1\/64, PP-1\/128, PP-1\/192, and PP-1\/256. Our attack is applicable to full-round versions of them, respectively. The proposed attacks can recover a secret key of PP-1 with the computational complexity which is faster than the exhaustive search. These are the first known cryptanalytic results on PP-1. <\/jats:p>","DOI":"10.1155\/2013\/169638","type":"journal-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T21:01:19Z","timestamp":1380661279000},"page":"169638","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Security Analysis of Scalable Block Cipher PP-1 Applicable to Distributed Sensor Networks"],"prefix":"10.1177","volume":"9","author":[{"given":"Yuseop","family":"Lee","sequence":"first","affiliation":[{"name":"Center for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of Korea"}]},{"given":"Kitae","family":"Jeong","sequence":"additional","affiliation":[{"name":"Center for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8681-4106","authenticated-orcid":false,"given":"Jaechul","family":"Sung","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Seoul, Jeonnong-dong, Dongdaemun-gu, Seoul 130-743, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4292-5792","authenticated-orcid":false,"given":"Changhoon","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Seoul National University of Science and Technology, 232 Gongneung-ro, Nowon-gu, Seoul 139-743, Republic of Korea"}]},{"given":"Seokhie","family":"Hong","sequence":"additional","affiliation":[{"name":"Center for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of Korea"}]},{"given":"Ku-Young","family":"Chang","sequence":"additional","affiliation":[{"name":"Electronics and Telecommunication Research Institute, 218 Gajeong-ro, Yuseong-gu, Daejeon 305-700, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2013,9,30]]},"reference":[{"key":"B3-2013-169638","doi-asserted-by":"publisher","DOI":"10.3745\/JIPS.2011.7.1.017"},{"key":"B5-2013-169638","doi-asserted-by":"publisher","DOI":"10.1109\/ITCS.2010.5581293"},{"key":"B8-2013-169638","doi-asserted-by":"publisher","DOI":"10.1109\/ISPAW.2011.39"},{"key":"B10-2013-169638","doi-asserted-by":"publisher","DOI":"10.1504\/IJITCC.2011.039281"},{"key":"B11-2013-169638","doi-asserted-by":"publisher","DOI":"10.3745\/JIPS.2010.6.4.609"},{"key":"B12-2013-169638","doi-asserted-by":"publisher","DOI":"10.1504\/IJITCC.2010.035224"},{"key":"B4-2013-169638","first-page":"46","volume":"4249","author":"Hong D.","year":"2006","journal-title":"Cryptographic Hardware and Embedded Systems"},{"key":"B7-2013-169638","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74619-5_12"},{"key":"B2-2013-169638","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_20"},{"key":"B1-2013-169638","doi-asserted-by":"publisher","DOI":"10.2478\/v10006-010-0030-6"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/169638","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/169638","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/169638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T20:25:37Z","timestamp":1621196737000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/169638"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,1]]},"references-count":10,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2013,9,1]]}},"alternative-id":["10.1155\/2013\/169638"],"URL":"https:\/\/doi.org\/10.1155\/2013\/169638","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2013,9,1]]}}}