Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Security analysis of the SCO-family using key schedules

Authors
Jeong, KitaeLee, ChanghoonKim, JongsungHong, Seokhie
Issue Date
15-Dec-2009
Publisher
ELSEVIER SCIENCE INC
Keywords
Block ciphers; SCO-family; SCO-1; SCO-2; SCO-3; Data dependent operation; Related-key differential attack; Cryptanalysis
Citation
INFORMATION SCIENCES, v.179, no.24, pp.4232 - 4242
Indexed
SCIE
SCOPUS
Journal Title
INFORMATION SCIENCES
Volume
179
Number
24
Start Page
4232
End Page
4242
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/118749
DOI
10.1016/j.ins.2009.08.009
ISSN
0020-0255
Abstract
The COS-based ciphers SCO-1, SCO-2 and SCO-3 (called the SCO-family) have been designed to improve the security of DDP-based ciphers which are all broken by related-key attacks. In this paper we show that the SCO-family is still vulnerable to related-key attacks: we present related-key differential attacks on a full-round SCO-1, a full-round SCO-2 and an 11-round reduced SCO-3, respectively. The attack on SCO-1 requires 2(61) related-key chosen ciphertexts and 2(120.59) full-round SCO-1 decryptions. For the attack on SCO-2, we require 2(59) related-key chosen plaintexts and 2(118.42) full-round SCO-2 encryptions, and the 11-round attack on SCO-3 works with 2 58 related-key chosen plaintexts and 2(117.54) 11-round SCO-3 encryptions. This work is the first known cryptanalytic results on the SCO-family. (C) 2009 Elsevier Inc. All rights reserved.
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hong, Seok hie photo

Hong, Seok hie
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE