Jaechul SUNG


Known-Key Attack on SM4 Block Cipher
HyungChul KANG Deukjo HONG Jaechul SUNG Seokhie HONG 
Publication:   
Publication Date: 2017/12/01
Vol. E100-A  No. 12  pp. 2985-2990
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
SM4 block cipherknown-key distinguishercollision attack
 Summary | Full Text:PDF(2.2MB)

Known-Key Attacks on Generalized Feistel Schemes with SP Round Function
HyungChul KANG Deukjo HONG Dukjae MOON Daesung KWON Jaechul SUNG Seokhie HONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/09/01
Vol. E95-A  No. 9  pp. 1550-1560
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
generalized Feistel schemesrebound attackknown-key distinguishercollision attackhashing mode
 Summary | Full Text:PDF(1.7MB)

Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis
Jongsung KIM Changhoon LEE Jaechul SUNG Seokhie HONG Sangjin LEE Jongin LIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/10/01
Vol. E91-A  No. 10  pp. 3047-3058
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
provable securitydifferential cryptanalysislinear cryptanalysisFeistelCLEFIAMISTY
 Summary | Full Text:PDF(320.7KB)

Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function
Donghoon CHANG Mridul NANDI Jesang LEE Jaechul SUNG Seokhie HONG Jongin LIM Haeryong PARK Kilsoo CHUN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/09/01
Vol. E91-A  No. 9  pp. 2607-2614
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
hash functionrandom oracleideal cipher model
 Summary | Full Text:PDF(320.9KB)

Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks
Eunjin LEE Jongsung KIM Deukjo HONG Changhoon LEE Jaechul SUNG Seokhie HONG Jongin LIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/02/01
Vol. E91-A  No. 2  pp. 642-649
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
MISTY 1MISTY 2weak-key classesrelated-key amplified boomerang attackblock ciphers
 Summary | Full Text:PDF(722.7KB)

Impossible Differential Cryptanalysis of Zodiac
Deukjo HONG Jaechul SUNG Shiho MORIAI Sangjin LEE Jongin LIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 38-43
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
Zodiacimpossible differential cryptanalysis
 Summary | Full Text:PDF(956.9KB)