Related-Key Differential Attacks on COSB-128

被引:0
|
作者
Song Dat Phuc Tran [1 ]
Lee, Changhoon [1 ]
机构
[1] Seoul Natl Univ Sci & Technol, Dept Comp Sci & Engn, Seoul 139743, South Korea
关键词
DESIGN;
D O I
10.1155/2015/617972
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
COSB-128 (Moldovyan et al., 2002) is a block cipher with 128-bit and 256-bit secret keys, which use key and data-dependent operational substitutions in fast controllable permutation blocks (CPB) concept. It is designed with a simple key schedule to ensure a high speed of data transformation by fast block encryption algorithms and expected to be high stability to all known methods of cryptanalysis, especially differential and linear attacks. In this paper, we show that the COSB-128 block cipher still remains weaknesses to differential related-key cryptanalysis, by constructing two full 10-round related-key differential characteristics (DCs) of COSB-128 with high probabilities, and thence propose our two related-key differential attacks. The attacks require about 2(24) data and time complexities to recover 63-bit key information and 2 22 data and time complexities to recover 6-bit key information. This study is the first known cryptanalytic result on COSB-128 until now. From this study, the new potential for the cryptanalysis on these types of block cipher will be further revealed.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Related-key differential attacks on Cobra-H64/128
    Guo, J.-S. (guojs_crypt@126.com), 1600, Chinese Institute of Electronics (41):
  • [2] Related-key impossible differential attacks on LBlock
    Chongqing University of Posts and Telecommunications, Chongqing
    400065, China
    不详
    Henan
    450004, China
    不详
    Sichuan
    611830, China
    不详
    100000, China
    Tien Tzu Hsueh Pao, 10 (1948-1953):
  • [3] Related-key differential attacks on Cobra-H64 and Cobra-H128
    Lee, C
    Kim, J
    Sung, J
    Hong, S
    Lee, S
    Moon, D
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2005, 3796 : 201 - 219
  • [4] Security of Related-Key Differential Attacks on TWINE, Revisited
    Sakamoto, Kosei
    Minematsu, Kazuhiko
    Shibata, Nao
    Shigeri, Maki
    Kubo, Hiroyasu
    Funabiki, Yuki
    Isobe, Takanori
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 212 - 214
  • [5] Related-Key Differential Attacks on CHESS-64
    Luo, Wei
    Guo, Jiansheng
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (09): : 3266 - 3285
  • [6] Related-Key Differential Attacks on Reduced-Round LBlock
    Weng, Tianling
    Cui, Tingting
    Yang, Ting
    Guo, Yinghua
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [7] NEW RELATED-KEY ATTACKS AND PROPERTIES OF SKINNY-64-128 CIPHER
    Posteuca, Raluca
    Negara, Gabriel
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2017, 18 : 333 - 349
  • [8] Revisiting AES related-key differential attacks with constraint programming
    Gerault, David
    Lafourcade, Pascal
    Minier, Marine
    Solnon, Christine
    INFORMATION PROCESSING LETTERS, 2018, 139 : 24 - 29
  • [9] NEW KEY EXPANSION FUNCTION OF RIJNDAEL 128-BIT RESISTANCE TO THE RELATED-KEY ATTACKS
    Hussien, Hassan Mansur
    Muda, Zaiton
    Yasin, Sharifah Md
    JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGY-MALAYSIA, 2018, 17 (03): : 409 - 434
  • [10] Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1
    Taga, Bungo
    Moriai, Shiho
    Aoki, Kazumaro
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 17 - 33