Deukjo HONG


Known-Key Attack on SM4 Block Cipher
HyungChul KANG Deukjo HONG Jaechul SUNG Seokhie HONG 
Publication:   
Publication Date: 2017/12/01
Vol. E100-A  No. 12  pp. 2985-2990
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
SM4 block cipherknown-key distinguishercollision attack
 Summary | Full Text:PDF(2.2MB)

Cryptanalysis of Double-Block-Length Hash Modes MDC-4 and MJH
Deukjo HONG Daesung KWON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/08/01
Vol. E97-A  No. 8  pp. 1747-1753
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
hash functionhash modecollisionpreimageMDC-4MJH
 Summary | Full Text:PDF(566.1KB)

Known-Key Attacks on Generalized Feistel Schemes with SP Round Function
HyungChul KANG Deukjo HONG Dukjae MOON Daesung KWON Jaechul SUNG Seokhie HONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/09/01
Vol. E95-A  No. 9  pp. 1550-1560
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
generalized Feistel schemesrebound attackknown-key distinguishercollision attackhashing mode
 Summary | Full Text:PDF(1.7MB)

Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function
Dukjae MOON Deukjo HONG Daesung KWON Seokhie HONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/08/01
Vol. E95-A  No. 8  pp. 1379-1389
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
preimage attackhash modeFeistel schemeMisty schemeblock cipher
 Summary | Full Text:PDF(1.7MB)

Preimage and Second-Preimage Attacks on PGV Hashing Modes of Round-Reduced ARIA, Camellia, and Serpent
Deukjo HONG Bonwook KOO Dong-Chan KIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 372-380
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
ARIACamelliaSerpenthash functionPGVpreimagemeet-in-the-middle
 Summary | Full Text:PDF(781.8KB)

Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks
Eunjin LEE Jongsung KIM Deukjo HONG Changhoon LEE Jaechul SUNG Seokhie HONG Jongin LIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/02/01
Vol. E91-A  No. 2  pp. 642-649
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
MISTY 1MISTY 2weak-key classesrelated-key amplified boomerang attackblock ciphers
 Summary | Full Text:PDF(722.7KB)

Linear Attack Using Multiple Linear Approximations
Jun CHOI Deukjo HONG Seokhie HONG Sangjin LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 2-8
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Cryptography
Keyword: 
block cipherlinear cryptanalysismultiple linear cryptanalsis
 Summary | Full Text:PDF(183.3KB)

Impossible Differential Cryptanalysis of Zodiac
Deukjo HONG Jaechul SUNG Shiho MORIAI Sangjin LEE Jongin LIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 38-43
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
Zodiacimpossible differential cryptanalysis
 Summary | Full Text:PDF(956.9KB)