Security analysis of the full-round DDO-64 block cipher

Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee

Research output: Contribution to journalArticle

8 Citations (Scopus)

Abstract

DDO-64 is a 64-bit Feistel-like block cipher based on data-dependent operations (DDOs). It is composed of 8 rounds and uses a 128-bit key. There are two versions of DDO-64, named DDO-64V1 and DDO-64V2, according to the key schedule. They were designed under an attempt for improving the security and performance of DDP-based ciphers. In this paper, however, we show that like most of the existing DDP-based ciphers, DDO-64V1 and DDO-64V2 are also vulnerable to related-key attacks. The attack on DDO-64V1 requires 235.5 related-key chosen plaintexts and 263.5 encryptions while the attack on DDO-64V2 only needs 8 related-key chosen plaintexts and 231 encryptions; our attacks are both mainly due to their simple key schedules and structural weaknesses. These works are the first known cryptanalytic results on DDO-64V1 and DDO-64V2 so far.

Original languageEnglish
Pages (from-to)2328-2335
Number of pages8
JournalJournal of Systems and Software
Volume81
Issue number12
DOIs
Publication statusPublished - 2008 Dec 1

Fingerprint

Cryptography

Keywords

  • Block cipher
  • Boomerang attack
  • Cryptography
  • Data-dependent operation
  • Differential attack
  • Related-key attack

ASJC Scopus subject areas

  • Hardware and Architecture
  • Software
  • Information Systems

Cite this

Security analysis of the full-round DDO-64 block cipher. / Lee, Changhoon; Kim, Jongsung; Hong, Seokhie; Sung, Jaechul; Lee, Sangjin.

In: Journal of Systems and Software, Vol. 81, No. 12, 01.12.2008, p. 2328-2335.

Research output: Contribution to journalArticle

Lee, Changhoon ; Kim, Jongsung ; Hong, Seokhie ; Sung, Jaechul ; Lee, Sangjin. / Security analysis of the full-round DDO-64 block cipher. In: Journal of Systems and Software. 2008 ; Vol. 81, No. 12. pp. 2328-2335.
@article{208f19a0d0714646a831277e92f558e2,
title = "Security analysis of the full-round DDO-64 block cipher",
abstract = "DDO-64 is a 64-bit Feistel-like block cipher based on data-dependent operations (DDOs). It is composed of 8 rounds and uses a 128-bit key. There are two versions of DDO-64, named DDO-64V1 and DDO-64V2, according to the key schedule. They were designed under an attempt for improving the security and performance of DDP-based ciphers. In this paper, however, we show that like most of the existing DDP-based ciphers, DDO-64V1 and DDO-64V2 are also vulnerable to related-key attacks. The attack on DDO-64V1 requires 235.5 related-key chosen plaintexts and 263.5 encryptions while the attack on DDO-64V2 only needs 8 related-key chosen plaintexts and 231 encryptions; our attacks are both mainly due to their simple key schedules and structural weaknesses. These works are the first known cryptanalytic results on DDO-64V1 and DDO-64V2 so far.",
keywords = "Block cipher, Boomerang attack, Cryptography, Data-dependent operation, Differential attack, Related-key attack",
author = "Changhoon Lee and Jongsung Kim and Seokhie Hong and Jaechul Sung and Sangjin Lee",
year = "2008",
month = "12",
day = "1",
doi = "10.1016/j.jss.2008.04.039",
language = "English",
volume = "81",
pages = "2328--2335",
journal = "Journal of Systems and Software",
issn = "0164-1212",
publisher = "Elsevier Inc.",
number = "12",

}

TY - JOUR

T1 - Security analysis of the full-round DDO-64 block cipher

AU - Lee, Changhoon

AU - Kim, Jongsung

AU - Hong, Seokhie

AU - Sung, Jaechul

AU - Lee, Sangjin

PY - 2008/12/1

Y1 - 2008/12/1

N2 - DDO-64 is a 64-bit Feistel-like block cipher based on data-dependent operations (DDOs). It is composed of 8 rounds and uses a 128-bit key. There are two versions of DDO-64, named DDO-64V1 and DDO-64V2, according to the key schedule. They were designed under an attempt for improving the security and performance of DDP-based ciphers. In this paper, however, we show that like most of the existing DDP-based ciphers, DDO-64V1 and DDO-64V2 are also vulnerable to related-key attacks. The attack on DDO-64V1 requires 235.5 related-key chosen plaintexts and 263.5 encryptions while the attack on DDO-64V2 only needs 8 related-key chosen plaintexts and 231 encryptions; our attacks are both mainly due to their simple key schedules and structural weaknesses. These works are the first known cryptanalytic results on DDO-64V1 and DDO-64V2 so far.

AB - DDO-64 is a 64-bit Feistel-like block cipher based on data-dependent operations (DDOs). It is composed of 8 rounds and uses a 128-bit key. There are two versions of DDO-64, named DDO-64V1 and DDO-64V2, according to the key schedule. They were designed under an attempt for improving the security and performance of DDP-based ciphers. In this paper, however, we show that like most of the existing DDP-based ciphers, DDO-64V1 and DDO-64V2 are also vulnerable to related-key attacks. The attack on DDO-64V1 requires 235.5 related-key chosen plaintexts and 263.5 encryptions while the attack on DDO-64V2 only needs 8 related-key chosen plaintexts and 231 encryptions; our attacks are both mainly due to their simple key schedules and structural weaknesses. These works are the first known cryptanalytic results on DDO-64V1 and DDO-64V2 so far.

KW - Block cipher

KW - Boomerang attack

KW - Cryptography

KW - Data-dependent operation

KW - Differential attack

KW - Related-key attack

UR - http://www.scopus.com/inward/record.url?scp=54049122177&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=54049122177&partnerID=8YFLogxK

U2 - 10.1016/j.jss.2008.04.039

DO - 10.1016/j.jss.2008.04.039

M3 - Article

VL - 81

SP - 2328

EP - 2335

JO - Journal of Systems and Software

JF - Journal of Systems and Software

SN - 0164-1212

IS - 12

ER -