Abstract
The COS-based ciphers SCO-1, SCO-2 and SCO-3 (called the SCO-family) have been designed to improve the security of DDP-based ciphers which are all broken by related-key attacks. In this paper we show that the SCO-family is still vulnerable to related-key attacks: we present related-key differential attacks on a full-round SCO-1, a full-round SCO-2 and an 11-round reduced SCO-3, respectively. The attack on SCO-1 requires 261 related-key chosen ciphertexts and 2120.59 full-round SCO-1 decryptions. For the attack on SCO-2, we require 259 related-key chosen plaintexts and 2118.42 full-round SCO-2 encryptions, and the 11-round attack on SCO-3 works with 258 related-key chosen plaintexts and 2117.54 11-round SCO-3 encryptions. This work is the first known cryptanalytic results on the SCO-family.
Original language | English |
---|---|
Pages (from-to) | 4232-4242 |
Number of pages | 11 |
Journal | Information Sciences |
Volume | 179 |
Issue number | 24 |
DOIs | |
Publication status | Published - 2009 Dec 15 |
Keywords
- Block ciphers
- Cryptanalysis
- Data dependent operation
- Related-key differential attack
- SCO-1
- SCO-2
- SCO-3
- SCO-family
ASJC Scopus subject areas
- Theoretical Computer Science
- Software
- Control and Systems Engineering
- Computer Science Applications
- Information Systems and Management
- Artificial Intelligence