{"id":"https://openalex.org/W4409471545","doi":"https://doi.org/10.1186/s42400-024-00331-8","title":"Key committing attack on Tiaoxin-346 algorithm","display_name":"Key committing attack on Tiaoxin-346 algorithm","publication_year":2025,"publication_date":"2025-04-15","ids":{"openalex":"https://openalex.org/W4409471545","doi":"https://doi.org/10.1186/s42400-024-00331-8"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-024-00331-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00331-8","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00331-8","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00331-8","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100622085","display_name":"Nan Liu","orcid":"https://orcid.org/0000-0002-4810-4365"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Nan Liu","raw_affiliation_strings":["Department of Applied Mathematics, PLA SSF Information Engineering University, Science Avenue, Zhengzhou, 450001, Henan, China"],"affiliations":[{"raw_affiliation_string":"Department of Applied Mathematics, PLA SSF Information Engineering University, Science Avenue, Zhengzhou, 450001, Henan, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029727008","display_name":"Chenhui Jin","orcid":"https://orcid.org/0000-0003-4941-7133"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenhui Jin","raw_affiliation_strings":["Department of Applied Mathematics, PLA SSF Information Engineering University, Science Avenue, Zhengzhou, 450001, Henan, China"],"affiliations":[{"raw_affiliation_string":"Department of Applied Mathematics, PLA SSF Information Engineering University, Science Avenue, Zhengzhou, 450001, Henan, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064951946","display_name":"Junwei Yu","orcid":"https://orcid.org/0000-0003-2737-9789"},"institutions":[{"id":"https://openalex.org/I36152291","display_name":"Henan University of Technology","ror":"https://ror.org/05sbgwt55","country_code":"CN","type":"education","lineage":["https://openalex.org/I36152291"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junwei Yu","raw_affiliation_strings":["School of Artificial Intelligence and Big Data, Henan University of Technology, Lianhua Street, Zhengzhou, 450001, Henan, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence and Big Data, Henan University of Technology, Lianhua Street, Zhengzhou, 450001, Henan, China","institution_ids":["https://openalex.org/I36152291"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100622085"],"corresponding_institution_ids":["https://openalex.org/I169689159"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.03432618,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6643767952919006},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6049483418464661},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4118039309978485},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23578238487243652}],"concepts":[{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6643767952919006},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6049483418464661},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4118039309978485},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23578238487243652}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-024-00331-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00331-8","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00331-8","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d1910503f1144a1fb74819941f07faed","is_oa":true,"landing_page_url":"https://doaj.org/article/d1910503f1144a1fb74819941f07faed","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-7 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-024-00331-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00331-8","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00331-8","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4409471545.pdf","grobid_xml":"https://content.openalex.org/works/W4409471545.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W2144752539","https://openalex.org/W2604722692","https://openalex.org/W2740612841","https://openalex.org/W2896479683","https://openalex.org/W2909850752","https://openalex.org/W3141585064","https://openalex.org/W4210248528","https://openalex.org/W4296960192","https://openalex.org/W4365807719","https://openalex.org/W4392358714"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109"],"abstract_inverted_index":{"Abstract":[0],"Key":[1],"committing":[2,46],"security":[3,296,308],"is":[4,145,264],"a":[5,27,44,64,74,180,212,219],"crucial":[6],"metric":[7],"of":[8,16,33,58,77,151,183,215,232,261,274,297,301,309,320],"authentication":[9],"encryption":[10,51,311],"schemes,":[11],"complementing":[12],"the":[13,49,56,69,141,216,229,233,239,258,270,293,307,318],"fundamental":[14],"principles":[15],"confidentiality":[17],"and":[18,36,161,197,218,313],"integrity.":[19],"It":[20],"ensures":[21],"that":[22,139],"an":[23,224],"adversary":[24],"cannot":[25],"decrypt":[26],"given":[28,186],"ciphertext":[29],"to":[30,147,305],"different":[31,75],"sets":[32],"key,":[34],"nonce,":[35],"associated":[37,162],"data.":[38],"In":[39],"this":[40,302],"study,":[41],"we":[42,137],"explore":[43],"key":[45,152,188,294],"attack":[47,263,272],"on":[48],"authenticated":[50,310],"stream":[52],"cipher":[53],"Tiaoxin-346":[54,142],"from":[55],"perspective":[57],"internal":[59,225],"state":[60,226],"collisions.":[61],"We":[62,210],"establish":[63],"more":[65],"rigorous":[66],"constraint":[67],"within":[68],"FROB":[70],"framework":[71],"by":[72],"identifying":[73],"settings":[76,150],"$$\\left(":[78,110],"k_{2},":[79],"Nonce,":[80,112],"AD^{*}\\right)$$":[81],"<mml:math":[82,114,154,165,190,199,242,277],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[83,115,155,166,191,200,243,278],"<mml:mfenced>":[84,116,281],"<mml:msub>":[85,117,129,156,192,203],"<mml:mi>k</mml:mi>":[86,118,157,193],"<mml:mn>2</mml:mn>":[87,158,283],"</mml:msub>":[88,120,132,159,195,206],"<mml:mo>,</mml:mo>":[89,95,121,127],"<mml:mi>N</mml:mi>":[90,122],"<mml:mi>o</mml:mi>":[91,123],"<mml:mi>n</mml:mi>":[92,124],"<mml:mi>c</mml:mi>":[93,125],"<mml:mi>e</mml:mi>":[94,126],"<mml:mi>A</mml:mi>":[96,128,168,202,245],"<mml:mmultiscripts>":[97,169,246],"<mml:mi>D</mml:mi>":[98,130,170,204,247],"<mml:mrow/>":[99,101,171,173,248,250],"<mml:mrow>":[100,167,172,201,244,249,279],"<mml:mo>\u2217</mml:mo>":[102,174,251],"</mml:mrow>":[103,175,177,207,252,254,287],"</mml:mmultiscripts>":[104,176,253],"</mml:mfenced>":[105,133,286],"</mml:math>":[106,134,160,178,196,208,255,288],"for":[107,140,222,317],"any":[108,187],"specified":[109],"k_{1},":[111],"AD_{1}\\right)$$":[113],"<mml:mn>1</mml:mn>":[119,131,194,205],".":[135,209,256],"Specifically,":[136],"demonstrate":[138],"algorithm,":[143],"it":[144],"possible":[146],"find":[148],"another":[149],"$$k_{2}$$":[153],"data":[163],"$$AD^{*}$$":[164,241],"with":[179],"computational":[181,259],"complexity":[182,260,273],"O":[184,265],"(1),":[185,266],"$$k_{1}$$":[189],"$$AD_{1}$$":[198],"provide":[211],"detailed":[213],"explanation":[214],"rationale":[217],"step-by-step":[220],"methodology":[221],"constructing":[223],"collision":[227],"at":[228,237],"seventh":[230],"round":[231,321],"update":[234,322],"process,":[235],"aimed":[236],"recovering":[238],"appropriate":[240],"Notably,":[257],"our":[262],"significantly":[267],"lower":[268],"than":[269],"generic":[271],"$$O\\left(":[275],"2^{64}\\right)$$":[276],"<mml:mi>O</mml:mi>":[280],"<mml:msup>":[282],"<mml:mn>64</mml:mn>":[284],"</mml:msup>":[285],",":[289],"which":[290],"effectively":[291],"violates":[292],"commitment":[295],"Tiaoxin-346.":[298],"The":[299],"results":[300],"study":[303],"contribute":[304],"refining":[306],"algorithms":[312],"offer":[314],"valuable":[315],"insights":[316],"design":[319],"functions":[323],"in":[324],"AES-based":[325],"schemes.":[326]},"counts_by_year":[],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
