Security analysis of the SCO-family using key schedules

التفاصيل البيبلوغرافية
العنوان: Security analysis of the SCO-family using key schedules
المؤلفون: Jeong, Kitae1 kite@cist.korea.ac.kr, Lee, Changhoon2 chlee@hs.ac.kr, Kim, Jongsung3 jongsung.k@gmail.com, Hong, Seokhie1 hsh@cist.korea.ac.kr
المصدر: Information Sciences. Dec2009, Vol. 179 Issue 24, p4232-4242. 11p.
مصطلحات موضوعية: *COMPUTER security, *MOBILE communication systems, *PUBLIC key cryptography, *INFORMATION services, *DATA protection, *CIPHERS
مستخلص: Abstract: The COS-based ciphers SCO-1, SCO-2 and SCO-3 (called the SCO-family) have been designed to improve the security of DDP-based ciphers which are all broken by related-key attacks. In this paper we show that the SCO-family is still vulnerable to related-key attacks: we present related-key differential attacks on a full-round SCO-1, a full-round SCO-2 and an 11-round reduced SCO-3, respectively. The attack on SCO-1 requires related-key chosen ciphertexts and full-round SCO-1 decryptions. For the attack on SCO-2, we require related-key chosen plaintexts and full-round SCO-2 encryptions, and the 11-round attack on SCO-3 works with related-key chosen plaintexts and 11-round SCO-3 encryptions. This work is the first known cryptanalytic results on the SCO-family. [Copyright &y& Elsevier]
قاعدة البيانات: Academic Search Index
الوصف
تدمد:00200255
DOI:10.1016/j.ins.2009.08.009