Security analysis of the SCO-family using key schedules
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jeong, Kitae | - |
dc.contributor.author | Lee, Changhoon | - |
dc.contributor.author | Kim, Jongsung | - |
dc.contributor.author | Hong, Seokhie | - |
dc.date.accessioned | 2021-09-08T10:40:48Z | - |
dc.date.available | 2021-09-08T10:40:48Z | - |
dc.date.created | 2021-06-11 | - |
dc.date.issued | 2009-12-15 | - |
dc.identifier.issn | 0020-0255 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/118749 | - |
dc.description.abstract | The COS-based ciphers SCO-1, SCO-2 and SCO-3 (called the SCO-family) have been designed to improve the security of DDP-based ciphers which are all broken by related-key attacks. In this paper we show that the SCO-family is still vulnerable to related-key attacks: we present related-key differential attacks on a full-round SCO-1, a full-round SCO-2 and an 11-round reduced SCO-3, respectively. The attack on SCO-1 requires 2(61) related-key chosen ciphertexts and 2(120.59) full-round SCO-1 decryptions. For the attack on SCO-2, we require 2(59) related-key chosen plaintexts and 2(118.42) full-round SCO-2 encryptions, and the 11-round attack on SCO-3 works with 2 58 related-key chosen plaintexts and 2(117.54) 11-round SCO-3 encryptions. This work is the first known cryptanalytic results on the SCO-family. (C) 2009 Elsevier Inc. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCIENCE INC | - |
dc.subject | ATTACKS | - |
dc.subject | CRYPTANALYSIS | - |
dc.subject | SPECTR-H64 | - |
dc.title | Security analysis of the SCO-family using key schedules | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hong, Seokhie | - |
dc.identifier.doi | 10.1016/j.ins.2009.08.009 | - |
dc.identifier.scopusid | 2-s2.0-70349731915 | - |
dc.identifier.wosid | 000271562000011 | - |
dc.identifier.bibliographicCitation | INFORMATION SCIENCES, v.179, no.24, pp.4232 - 4242 | - |
dc.relation.isPartOf | INFORMATION SCIENCES | - |
dc.citation.title | INFORMATION SCIENCES | - |
dc.citation.volume | 179 | - |
dc.citation.number | 24 | - |
dc.citation.startPage | 4232 | - |
dc.citation.endPage | 4242 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.subject.keywordPlus | ATTACKS | - |
dc.subject.keywordPlus | CRYPTANALYSIS | - |
dc.subject.keywordPlus | SPECTR-H64 | - |
dc.subject.keywordAuthor | Block ciphers | - |
dc.subject.keywordAuthor | SCO-family | - |
dc.subject.keywordAuthor | SCO-1 | - |
dc.subject.keywordAuthor | SCO-2 | - |
dc.subject.keywordAuthor | SCO-3 | - |
dc.subject.keywordAuthor | Data dependent operation | - |
dc.subject.keywordAuthor | Related-key differential attack | - |
dc.subject.keywordAuthor | Cryptanalysis | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.