Security analysis of the SCO-family using key schedules

被引:4
|
作者
Jeong, Kitae [2 ]
Lee, Changhoon [1 ]
Kim, Jongsung [3 ]
Hong, Seokhie [2 ]
机构
[1] Hanshin Univ, Sch Comp Engn, Hanshin, South Korea
[2] Korea Univ, CIST, Seoul, South Korea
[3] Kyungnam Univ, Dept E Business, Kyungnam, South Korea
关键词
Block ciphers; SCO-family; SCO-1; SCO-2; SCO-3; Data dependent operation; Related-key differential attack; Cryptanalysis; ATTACKS; CRYPTANALYSIS; SPECTR-H64;
D O I
10.1016/j.ins.2009.08.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The COS-based ciphers SCO-1, SCO-2 and SCO-3 (called the SCO-family) have been designed to improve the security of DDP-based ciphers which are all broken by related-key attacks. In this paper we show that the SCO-family is still vulnerable to related-key attacks: we present related-key differential attacks on a full-round SCO-1, a full-round SCO-2 and an 11-round reduced SCO-3, respectively. The attack on SCO-1 requires 2(61) related-key chosen ciphertexts and 2(120.59) full-round SCO-1 decryptions. For the attack on SCO-2, we require 2(59) related-key chosen plaintexts and 2(118.42) full-round SCO-2 encryptions, and the 11-round attack on SCO-3 works with 2 58 related-key chosen plaintexts and 2(117.54) 11-round SCO-3 encryptions. This work is the first known cryptanalytic results on the SCO-family. (C) 2009 Elsevier Inc. All rights reserved.
引用
收藏
页码:4232 / 4242
页数:11
相关论文
共 50 条
  • [1] Enhancing the Related-Key Security of PIPO Through New Key Schedules
    Baek, Seungjun
    Kim, Giyoon
    Jeon, Yongjin
    Kim, Jongsung
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2023, PT I, 2024, 14561 : 3 - 18
  • [2] A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations
    Kang, Ju-Sung
    Kim, Nayoung
    Ju, Wangho
    Yi, Ok-Yeon
    INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS, 2014, 8501 : 10 - 23
  • [3] Security analysis for key generation systems using face images
    Zhang, WD
    Zhan, C
    Chen, TH
    ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 3455 - 3458
  • [4] Quantum key distribution using multilevel encoding:: security analysis
    Bourennane, M
    Karlsson, A
    Björk, G
    Gisin, N
    Cerf, NJ
    JOURNAL OF PHYSICS A-MATHEMATICAL AND GENERAL, 2002, 35 (47): : 10065 - 10076
  • [5] Analysis of Using Java']Java Card for DRM Master Key Security
    Buford, John
    Kumar, Rakesh
    2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2006, : 1129 - +
  • [6] Security Analysis and Key Modification for ZHFE
    Perlner, Ray
    Smith-Tone, Daniel
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2016, 2016, 9606 : 197 - 212
  • [7] Security Analysis of the MLS Key Derivation
    Brzuska, Chris
    Cornelissen, Eric
    Kohbrok, Konrad
    43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 2535 - 2553
  • [8] Security Analysis of Authenticated key Agreement Protocol using Extended SVO Logic
    Liu, Zhimeng
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 421 - 424
  • [9] Generation of Security Key using ECG Signal
    Khokher, Rohit
    Singh, Ram Chandra
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 895 - 900
  • [10] Security analysis of quantum key distribution protocol
    Omine T.
    Yamada C.
    Miyagi K.
    Ichikawa S.
    IEEJ Transactions on Industry Applications, 2016, 136 (10) : 698 - 702