Security Analysis on the Full-Round SCO-1

Vol. 18, No. 4, pp. 27-36, Aug. 2008
10.13089/JKIISC.2008.18.4.27, Full Text:
Keywords: block cipher, SCO-1, Data-Dependent Operation, Related-Key Differential Attack, cryptanalysis
Abstract

In this paper we show that the full-round SCO-1[12] is vulnerable to the related-key differential attack. The attack on the full-round SCO-1 requires $2^{61}$ related-key chosen ciphertexts and $2^{120.59}$ full-round SCO-1 decryptions. This work is the first known attack on SCO-1.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
K. Jeong, C. Lee, J. Kim, S. Hong, "Security Analysis on the Full-Round SCO-1," Journal of The Korea Institute of Information Security and Cryptology, vol. 18, no. 4, pp. 27-36, 2008. DOI: 10.13089/JKIISC.2008.18.4.27.

[ACM Style]
Ki-Tae Jeong, Chang-Hoon Lee, Jong-Sung Kim, and Seok-Hie Hong. 2008. Security Analysis on the Full-Round SCO-1. Journal of The Korea Institute of Information Security and Cryptology, 18, 4, (2008), 27-36. DOI: 10.13089/JKIISC.2008.18.4.27.