Security analysis of the SCO-family using key schedules

Kitae Jeong, Changhoon Lee, Jongsung Kim, Seokhie Hong

Research output: Contribution to journalArticlepeer-review

6 Citations (Scopus)

Abstract

The COS-based ciphers SCO-1, SCO-2 and SCO-3 (called the SCO-family) have been designed to improve the security of DDP-based ciphers which are all broken by related-key attacks. In this paper we show that the SCO-family is still vulnerable to related-key attacks: we present related-key differential attacks on a full-round SCO-1, a full-round SCO-2 and an 11-round reduced SCO-3, respectively. The attack on SCO-1 requires 261 related-key chosen ciphertexts and 2120.59 full-round SCO-1 decryptions. For the attack on SCO-2, we require 259 related-key chosen plaintexts and 2118.42 full-round SCO-2 encryptions, and the 11-round attack on SCO-3 works with 258 related-key chosen plaintexts and 2117.54 11-round SCO-3 encryptions. This work is the first known cryptanalytic results on the SCO-family.

Original languageEnglish
Pages (from-to)4232-4242
Number of pages11
JournalInformation Sciences
Volume179
Issue number24
DOIs
Publication statusPublished - 2009 Dec 15

Keywords

  • Block ciphers
  • Cryptanalysis
  • Data dependent operation
  • Related-key differential attack
  • SCO-1
  • SCO-2
  • SCO-3
  • SCO-family

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Software
  • Control and Systems Engineering
  • Computer Science Applications
  • Information Systems and Management
  • Artificial Intelligence

Fingerprint

Dive into the research topics of 'Security analysis of the SCO-family using key schedules'. Together they form a unique fingerprint.

Cite this