Related-Key Differential Attacks on COSB-128

被引:0
|
作者
Song Dat Phuc Tran [1 ]
Lee, Changhoon [1 ]
机构
[1] Seoul Natl Univ Sci & Technol, Dept Comp Sci & Engn, Seoul 139743, South Korea
关键词
DESIGN;
D O I
10.1155/2015/617972
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
COSB-128 (Moldovyan et al., 2002) is a block cipher with 128-bit and 256-bit secret keys, which use key and data-dependent operational substitutions in fast controllable permutation blocks (CPB) concept. It is designed with a simple key schedule to ensure a high speed of data transformation by fast block encryption algorithms and expected to be high stability to all known methods of cryptanalysis, especially differential and linear attacks. In this paper, we show that the COSB-128 block cipher still remains weaknesses to differential related-key cryptanalysis, by constructing two full 10-round related-key differential characteristics (DCs) of COSB-128 with high probabilities, and thence propose our two related-key differential attacks. The attacks require about 2(24) data and time complexities to recover 63-bit key information and 2 22 data and time complexities to recover 6-bit key information. This study is the first known cryptanalytic result on COSB-128 until now. From this study, the new potential for the cryptanalysis on these types of block cipher will be further revealed.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Quantum related-key differential cryptanalysis
    Wu, Hongyu
    Feng, Xiaoning
    QUANTUM INFORMATION PROCESSING, 2024, 23 (07)
  • [32] Related-key differential attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b
    Lee, C
    Kim, J
    Hong, S
    Sung, J
    Lee, S
    PROGRESS IN CRYPTOLOGY - MYCRYPT 2005, 2005, 3715 : 244 - 262
  • [33] Related-key impossible differential attacks on reduced-round AES-256
    State Key Laboratory of Information Security, Graduate University, Chinese Acad. of Sci., Beijing 100049, China
    不详
    Ruan Jian Xue Bao, 2007, 11 (2893-2901):
  • [34] Related-key impossible differential attacks on 8-round AES-192
    Biham, E
    Dunkelman, O
    Keller, N
    TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 21 - 33
  • [35] Weak Keys of the Block Cipher SEED-192 for Related-Key Differential Attacks
    Kim, Jongsung
    Park, Jong Hyuk
    Kim, Young-Gon
    SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 157 - +
  • [36] Strong Known Related-Key Attacks and the Security of ECDSA
    Yuen, Tsz Hon
    Yiu, Siu-Ming
    NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 130 - 145
  • [37] Cryptography Secure against Related-Key Attacks and Tampering
    Bellare, Mihir
    Cash, David
    Miller, Rachel
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 486 - +
  • [38] Anonymous Signcryption against Linear Related-Key Attacks
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 165 - 183
  • [39] Public-Key Encryption Resilient to Linear Related-Key Attacks
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 182 - 196
  • [40] Signcryption Secure Against Linear Related-Key Attacks
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    COMPUTER JOURNAL, 2014, 57 (10): : 1472 - 1483