Security analysis of the SCO-family using key schedules

被引:4
|
作者
Jeong, Kitae [2 ]
Lee, Changhoon [1 ]
Kim, Jongsung [3 ]
Hong, Seokhie [2 ]
机构
[1] Hanshin Univ, Sch Comp Engn, Hanshin, South Korea
[2] Korea Univ, CIST, Seoul, South Korea
[3] Kyungnam Univ, Dept E Business, Kyungnam, South Korea
关键词
Block ciphers; SCO-family; SCO-1; SCO-2; SCO-3; Data dependent operation; Related-key differential attack; Cryptanalysis; ATTACKS; CRYPTANALYSIS; SPECTR-H64;
D O I
10.1016/j.ins.2009.08.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The COS-based ciphers SCO-1, SCO-2 and SCO-3 (called the SCO-family) have been designed to improve the security of DDP-based ciphers which are all broken by related-key attacks. In this paper we show that the SCO-family is still vulnerable to related-key attacks: we present related-key differential attacks on a full-round SCO-1, a full-round SCO-2 and an 11-round reduced SCO-3, respectively. The attack on SCO-1 requires 2(61) related-key chosen ciphertexts and 2(120.59) full-round SCO-1 decryptions. For the attack on SCO-2, we require 2(59) related-key chosen plaintexts and 2(118.42) full-round SCO-2 encryptions, and the 11-round attack on SCO-3 works with 2 58 related-key chosen plaintexts and 2(117.54) 11-round SCO-3 encryptions. This work is the first known cryptanalytic results on the SCO-family. (C) 2009 Elsevier Inc. All rights reserved.
引用
收藏
页码:4232 / 4242
页数:11
相关论文
共 50 条
  • [21] Key Exchange using Ternary system to Enhance Security
    Assiri, Sareh
    Cambou, Bertrand
    Booher, D. Duane
    Miandoab, Dina Ghanai
    Mohammadinodoushan, Mohammad
    2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2019, : 488 - 492
  • [22] Polynomial Analysis of DH Secrete Key and Bit Security
    JIANG Zheng-tao
    Wuhan University Journal of Natural Sciences, 2005, (01) : 239 - 242
  • [23] Security Analysis of Broadcaster Group Key Exchange Protocols
    LI Li~ 1
    2. School of Computer
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1577 - 1580
  • [24] Security Analysis of Existing IoT Key Management Protocols
    Naoui, Sarra
    Elhdhili, Mohamed Elhoucine
    Saidane, Leila Azouz
    2016 IEEE/ACS 13TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2016,
  • [25] Systematic Security Analysis of Stream Encryption With Key Erasure
    Chen, Yu Long
    Luykx, Atul
    Mennink, Bart
    Preneel, Bart
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2021, 67 (11) : 7518 - 7534
  • [26] Security analysis and improvement of the global key recovery system
    Yang, YJ
    Bao, F
    Deng, RH
    INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 17 - 24
  • [27] Security Analysis of Unidimensional Continuous-Variable Quantum Key Distribution Using Uncertainty Relations
    Wang, Pu
    Wang, Xuyang
    Li, Yongmin
    ENTROPY, 2018, 20 (03)
  • [28] Security Analysis of Password-Authenticated Key Retrieval
    Shin, SeongHan
    Kobara, Kazukuni
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (05) : 573 - 576
  • [29] Dynamic security analysis of group key agreement protocol
    Sun, H
    Lin, DD
    IEE PROCEEDINGS-COMMUNICATIONS, 2005, 152 (02): : 134 - 137
  • [30] Security analysis of KEA authenticated key exchange protocol
    Lauter, Kristin
    Mityagin, Anton
    PUBLIC KEY CRYPTOGRAPHY - PKC 2006, PROCEEDINGS, 2006, 3958 : 378 - 394