Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Related-Key Differential Attacks on Cobra-H64 and Cobra-H128

  • Conference paper
Cryptography and Coding(Cryptography and Coding 2005)

Part of the book series:Lecture Notes in Computer Science ((LNSC,volume 3796))

Included in the following conference series:

Abstract

Cobra-H64 and Cobra-H128, which use data-dependent permutations as a main cryptographic primitive, are 64-bit and 128-bit iterated block ciphers with 128-bit and 256-bit keys, respectively. Since these ciphers use very simple key scheduling and controlled permutation (CP) for fast hardware encryption, they are suitable for wireless communications networks which require high-speed networks. Actually, these ciphers have better hardware performances than other ciphers used in security layers of wireless protocols (Wap, OMA, UMTS, IEEE 802.11 and so on). In this paper, however, we show that Cobra-H64 and Cobra-H128 are vulnerable to related-key differential attacks. We first describe how to construct full-round related-key differential characteristics of Cobra-H64 and Cobra-H128 with high probabilities and then we exploit them to attack full-round Cobra-H64 with a complexity of 215.5 and Cobra-H128 with a complexity of 244.

This is a preview of subscription content,log in via an institution to check access.

Access this chapter

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard. Springer, Heidelberg (1993)

    MATH  Google Scholar 

  2. Goots, N.D., Izotov, B.V., Moldovyan, A.A., Moldovyan, N.A.: Modern cryptography: Protect Your Data with Fast Block Ciphers. A-LIST Publish., Wayne (2003)

    Google Scholar 

  3. Goots, N.D., Izotov, B.V., Moldovyan, A.A., Moldovyan, N.A.: Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol. 2776, pp. 449–452. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  4. Goots, N.D., Moldovyan, N.A., Moldovyanu, P.A., Summerville, D.H.: Fast DDP-Based Ciphers: From Hardware to Software. In: 46th IEEE Midwest International Symposium on Circuits and Systems (2003)

    Google Scholar 

  5. Goots, N.D., Moldovyan, A.A., Moldovyan, N.A.: Fast Encryption Algorithm Spectr-H64. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol. 2052, pp. 275–286. Springer, Heidelberg (2001)

    Google Scholar 

  6. Kavut, S., Yücel, M.D.: Slide Attack on Spectr-H64. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol. 2551, pp. 34–47. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  7. Kelsey, J., Schneier, B., Wagner, D.: Key Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 237–251. Springer, Heidelberg (1996)

    Google Scholar 

  8. Kelsey, J., Schneier, B., Wagner, D.: Related-Key Cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 233–246. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  9. Kim, J., Kim, G., Hong, S., Lee, S., Hong, D.: The Related-Key Rectangle Attack - Application to SHACAL-1. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 123–136. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  10. Kim, J., Kim, G., Lee, S., Lim, J., Song, J.: Related-Key Attacks on Reduced Rounds of SHACAL-2. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 175–190. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Ko, Y., Hong, D., Hong, S., Lee, S., Lim, J.: Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol. 2776, pp. 298–307. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Ko, Y., Lee, C., Hong, S., Lee, S.: Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 137–148. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  13. Ko, Y., Lee, C., Hong, S., Sung, J., Lee, S.: Related-Key Attacks on DDP based Ciphers: CIKS-128 and CIKS-128H. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 191–205. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  14. Lee, C., Hong, D., Lee, S., Lee, S., Yang, H., Lim, J.: A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 456–468. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  15. Lee, C., Kim, J., Hong, S., Sung, J.: Related Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 245–263. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  16. Moldovyan, A.A., Moldovyan, N.A.: A cipher Based on Data-Dependent Permutations. Journal of Cryptology 15(1), 61–72 (2002)

    Article MathSciNet  Google Scholar 

  17. Sklavos, N., Moldovyan, N.A., Koufopavlou, O.: High Speed Networking Security: Design and Implementation of Two New DDP-Based Ciphers. Mobile Networks and Applications-MONET 25(1-2), 219–231 (2005)

    Article  Google Scholar 

  18. Phan, R.C.-W., Handschuh, H.: On Related-Key and Collision Attacks: The case for the IBM 4758 Cryptoprocessor. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 111–122. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Center for Information Security Technologies(CIST), Korea University, Anam Dong, Sungbuk Gu, Seoul, Korea

    Changhoon Lee, Seokhie Hong & Sangjin Lee

  2. Katholieke Universiteit Leuven, ESAT/SCD-COSIC, Belgium

    Jongsung Kim

  3. Department of Mathematics, University of Seoul, 90 Cheonnong Dong, Dongdaemun Gu, Seoul, Korea

    Jaechul Sung

  4. National Security Research Institute, 161 Gajeong-dong, Yuseong-gu, Daejeon, 305-350, Korea

    Dukjae Moon

Authors
  1. Changhoon Lee

    You can also search for this author inPubMed Google Scholar

  2. Jongsung Kim

    You can also search for this author inPubMed Google Scholar

  3. Jaechul Sung

    You can also search for this author inPubMed Google Scholar

  4. Seokhie Hong

    You can also search for this author inPubMed Google Scholar

  5. Sangjin Lee

    You can also search for this author inPubMed Google Scholar

  6. Dukjae Moon

    You can also search for this author inPubMed Google Scholar

Editor information

Editors and Affiliations

  1. Dept. Computer Science, University of Bristol, Woodland Road, BS8 1UB, Bristol, United Kingdom

    Nigel P. Smart

Rights and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, C., Kim, J., Sung, J., Hong, S., Lee, S., Moon, D. (2005). Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. In: Smart, N.P. (eds) Cryptography and Coding. Cryptography and Coding 2005. Lecture Notes in Computer Science, vol 3796. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11586821_14

Download citation

Publish with us


[8]ページ先頭

©2009-2025 Movatter.jp