Related-key differential attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b

Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

Data-dependent permutations (DDPs) which are very suitable for cheap hardware implementations have been introduced as a cryptographic primitive. Cobra-S128 and Cobra-F64 (which is a generic name for Cobra-F64a and Cobra-F64b) are 128-bit and 64-bit iterated block ciphers with a 128-bit key size based on such DDPs, respectively. Unlike the predecessor DDP-based ciphers [16,5], Cobra-8128 is a software-oriented cipher and Cobra-F64 is a firmware-suitable cipher. In this paper, we derive several structural properties of Cobra-8128 and Cobra-F64 and then use them to devise key recovery attacks on Cobra-8128 and Cobra-F64. These works are the first known attacks on Cobra-8128 and Cobra-F64.

Original languageEnglish
Title of host publicationProgress in Cryptology - Mycrypt 2005 - First International Conference on Cryptology in Malaysia, Proceedings
PublisherSpringer Verlag
Pages244-262
Number of pages19
ISBN (Print)3540289380, 9783540289388
DOIs
Publication statusPublished - 2005
Event1st International Conference on Cryptology in Malaysia on Progress in Cryptology - Mycrypt 2005 - Kuala Lumpur, Malaysia
Duration: 2005 Sep 282005 Sep 30

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3715 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other1st International Conference on Cryptology in Malaysia on Progress in Cryptology - Mycrypt 2005
CountryMalaysia
CityKuala Lumpur
Period05/9/2805/9/30

Keywords

  • Block Cipher
  • Cobra-F64
  • Cobra-S128
  • Data-Dependent Permutation
  • Related-Key Attack

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Related-key differential attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b'. Together they form a unique fingerprint.

  • Cite this

    Lee, C., Kim, J., Hong, S., Sung, J., & Lee, S. (2005). Related-key differential attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b. In Progress in Cryptology - Mycrypt 2005 - First International Conference on Cryptology in Malaysia, Proceedings (pp. 244-262). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3715 LNCS). Springer Verlag. https://doi.org/10.1007/11554868_18