Related-key differential attacks on Cobra-H64 and Cobra-H128

Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, Dukjae Moon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

Abstract

Cobra-H64 and Cobra-H128, which use data-dependent permutations as a main cryptographic primitive, are 64-bit and 128-bit iterated block ciphers with 128-bit and 256-bit keys, respectively. Since these ciphers use very simple key scheduling and controlled permutation (CP) for fast hardware encryption, they are suitable for wireless communications networks which require high-speed networks. Actually, these ciphers have better hardware performances than other ciphers used in security layers of wireless protocols (Wap, OMA, UMTS, IEEE 802.11 and so on). In this paper, however, we show that Cobra-H64 and Cobra-H128 are vulnerable to related-key differential attacks. We first describe how to construct full-round related-key differential characteristics of Cobra-H64 and Cobra-H128 with high probabilities and then we exploit them to attack full-round Cobra-H64 with a complexity of 215.5 and Cobra-H128 with a complexity of 244.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages201-219
Number of pages19
Volume3796 LNCS
Publication statusPublished - 2005 Dec 1
Event10th IMA International Conference on Cryptography and Coding - Cirencester, United Kingdom
Duration: 2005 Dec 192005 Dec 21

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3796 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other10th IMA International Conference on Cryptography and Coding
CountryUnited Kingdom
CityCirencester
Period05/12/1905/12/21

Fingerprint

Elapidae
Attack
3G mobile communication systems
Permutation
Hardware
High-speed Networks
Block Ciphers
HIgh speed networks
IEEE 802.11
Dependent Data
Wireless Communication
Communication Networks
Computer hardware
Encryption
Telecommunication networks
Cryptography
Wireless Networks
Scheduling
Network protocols
Communication

Keywords

  • Block Ciphers
  • Cobra-H128
  • Cobra-H64
  • Data-Dependent Permutations
  • Related-Key At-tacks

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Lee, C., Kim, J., Sung, J., Hong, S., Lee, S., & Moon, D. (2005). Related-key differential attacks on Cobra-H64 and Cobra-H128. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3796 LNCS, pp. 201-219). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3796 LNCS).

Related-key differential attacks on Cobra-H64 and Cobra-H128. / Lee, Changhoon; Kim, Jongsung; Sung, Jaechul; Hong, Seokhie; Lee, Sangjin; Moon, Dukjae.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3796 LNCS 2005. p. 201-219 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3796 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lee, C, Kim, J, Sung, J, Hong, S, Lee, S & Moon, D 2005, Related-key differential attacks on Cobra-H64 and Cobra-H128. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 3796 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3796 LNCS, pp. 201-219, 10th IMA International Conference on Cryptography and Coding, Cirencester, United Kingdom, 05/12/19.
Lee C, Kim J, Sung J, Hong S, Lee S, Moon D. Related-key differential attacks on Cobra-H64 and Cobra-H128. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3796 LNCS. 2005. p. 201-219. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Lee, Changhoon ; Kim, Jongsung ; Sung, Jaechul ; Hong, Seokhie ; Lee, Sangjin ; Moon, Dukjae. / Related-key differential attacks on Cobra-H64 and Cobra-H128. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3796 LNCS 2005. pp. 201-219 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{5e60f25dbb8149b794c4113c30334f06,
title = "Related-key differential attacks on Cobra-H64 and Cobra-H128",
abstract = "Cobra-H64 and Cobra-H128, which use data-dependent permutations as a main cryptographic primitive, are 64-bit and 128-bit iterated block ciphers with 128-bit and 256-bit keys, respectively. Since these ciphers use very simple key scheduling and controlled permutation (CP) for fast hardware encryption, they are suitable for wireless communications networks which require high-speed networks. Actually, these ciphers have better hardware performances than other ciphers used in security layers of wireless protocols (Wap, OMA, UMTS, IEEE 802.11 and so on). In this paper, however, we show that Cobra-H64 and Cobra-H128 are vulnerable to related-key differential attacks. We first describe how to construct full-round related-key differential characteristics of Cobra-H64 and Cobra-H128 with high probabilities and then we exploit them to attack full-round Cobra-H64 with a complexity of 215.5 and Cobra-H128 with a complexity of 244.",
keywords = "Block Ciphers, Cobra-H128, Cobra-H64, Data-Dependent Permutations, Related-Key At-tacks",
author = "Changhoon Lee and Jongsung Kim and Jaechul Sung and Seokhie Hong and Sangjin Lee and Dukjae Moon",
year = "2005",
month = "12",
day = "1",
language = "English",
isbn = "354030276X",
volume = "3796 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "201--219",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Related-key differential attacks on Cobra-H64 and Cobra-H128

AU - Lee, Changhoon

AU - Kim, Jongsung

AU - Sung, Jaechul

AU - Hong, Seokhie

AU - Lee, Sangjin

AU - Moon, Dukjae

PY - 2005/12/1

Y1 - 2005/12/1

N2 - Cobra-H64 and Cobra-H128, which use data-dependent permutations as a main cryptographic primitive, are 64-bit and 128-bit iterated block ciphers with 128-bit and 256-bit keys, respectively. Since these ciphers use very simple key scheduling and controlled permutation (CP) for fast hardware encryption, they are suitable for wireless communications networks which require high-speed networks. Actually, these ciphers have better hardware performances than other ciphers used in security layers of wireless protocols (Wap, OMA, UMTS, IEEE 802.11 and so on). In this paper, however, we show that Cobra-H64 and Cobra-H128 are vulnerable to related-key differential attacks. We first describe how to construct full-round related-key differential characteristics of Cobra-H64 and Cobra-H128 with high probabilities and then we exploit them to attack full-round Cobra-H64 with a complexity of 215.5 and Cobra-H128 with a complexity of 244.

AB - Cobra-H64 and Cobra-H128, which use data-dependent permutations as a main cryptographic primitive, are 64-bit and 128-bit iterated block ciphers with 128-bit and 256-bit keys, respectively. Since these ciphers use very simple key scheduling and controlled permutation (CP) for fast hardware encryption, they are suitable for wireless communications networks which require high-speed networks. Actually, these ciphers have better hardware performances than other ciphers used in security layers of wireless protocols (Wap, OMA, UMTS, IEEE 802.11 and so on). In this paper, however, we show that Cobra-H64 and Cobra-H128 are vulnerable to related-key differential attacks. We first describe how to construct full-round related-key differential characteristics of Cobra-H64 and Cobra-H128 with high probabilities and then we exploit them to attack full-round Cobra-H64 with a complexity of 215.5 and Cobra-H128 with a complexity of 244.

KW - Block Ciphers

KW - Cobra-H128

KW - Cobra-H64

KW - Data-Dependent Permutations

KW - Related-Key At-tacks

UR - http://www.scopus.com/inward/record.url?scp=33646842041&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33646842041&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:33646842041

SN - 354030276X

SN - 9783540302766

VL - 3796 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 201

EP - 219

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -