• Title of article

    Security analysis of the SCO-family using key schedules

  • Author/Authors

    Kitae Jeong، نويسنده , , Changhoon Lee، نويسنده , , Jongsung Kim، نويسنده , , Seokhie Hong، نويسنده ,

  • Issue Information
    روزنامه با شماره پیاپی سال 2009
  • Pages
    11
  • From page
    4232
  • To page
    4242
  • Abstract
    The COS-based ciphers SCO-1, SCO-2 and SCO-3 (called the SCO-family) have been designed to improve the security of DDP-based ciphers which are all broken by related-key attacks. In this paper we show that the SCO-family is still vulnerable to related-key attacks: we present related-key differential attacks on a full-round SCO-1, a full-round SCO-2 and an 11-round reduced SCO-3, respectively. The attack on SCO-1 requires image related-key chosen ciphertexts and image full-round SCO-1 decryptions. For the attack on SCO-2, we require image related-key chosen plaintexts and image full-round SCO-2 encryptions, and the 11-round attack on SCO-3 works with image related-key chosen plaintexts and image 11-round SCO-3 encryptions. This work is the first known cryptanalytic results on the SCO-family.
  • Keywords
    cryptanalysis , Related-key differential attack , block ciphers , SCO-family , SCO-1 , Data dependent operation , SCO-3 , SCO-2
  • Journal title
    Information Sciences
  • Serial Year
    2009
  • Journal title
    Information Sciences
  • Record number

    1213807