Security analysis of the SCO-family using key schedules
- Authors
- Jeong, Kitae; Lee, Changhoon; Kim, Jongsung; Hong, Seokhie
- Issue Date
- 15-12월-2009
- Publisher
- ELSEVIER SCIENCE INC
- Keywords
- Block ciphers; SCO-family; SCO-1; SCO-2; SCO-3; Data dependent operation; Related-key differential attack; Cryptanalysis
- Citation
- INFORMATION SCIENCES, v.179, no.24, pp.4232 - 4242
- Indexed
- SCIE
SCOPUS
- Journal Title
- INFORMATION SCIENCES
- Volume
- 179
- Number
- 24
- Start Page
- 4232
- End Page
- 4242
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/118749
- DOI
- 10.1016/j.ins.2009.08.009
- ISSN
- 0020-0255
- Abstract
- The COS-based ciphers SCO-1, SCO-2 and SCO-3 (called the SCO-family) have been designed to improve the security of DDP-based ciphers which are all broken by related-key attacks. In this paper we show that the SCO-family is still vulnerable to related-key attacks: we present related-key differential attacks on a full-round SCO-1, a full-round SCO-2 and an 11-round reduced SCO-3, respectively. The attack on SCO-1 requires 2(61) related-key chosen ciphertexts and 2(120.59) full-round SCO-1 decryptions. For the attack on SCO-2, we require 2(59) related-key chosen plaintexts and 2(118.42) full-round SCO-2 encryptions, and the 11-round attack on SCO-3 works with 2 58 related-key chosen plaintexts and 2(117.54) 11-round SCO-3 encryptions. This work is the first known cryptanalytic results on the SCO-family. (C) 2009 Elsevier Inc. All rights reserved.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.