z-logo
open-access-imgOpen Access
Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b
Author(s) -
Changhoon Lee,
Jongsung Kim,
Seokhie Hong,
Jaechul Sung,
Sangjin Lee
Publication year - 2005
Publication title -
lecture notes in computer science
Language(s) - English
Resource type - Book series
SCImago Journal Rank - 0.249
H-Index - 400
eISSN - 1611-3349
pISSN - 0302-9743
ISBN - 3-540-28938-0
DOI - 10.1007/11554868_18
Subject(s) - cobra , computer science , block cipher , key (lock) , naja , serpent (symbolism) , firmware , cryptography , computer security , operating system , programming language , biology , ecology , history , archaeology , venom
Data-dependent permutations (DDPs) which are very suitable for cheap hardware implementations have been introduced as a cryptographic primitive. Cobra-S128 and Cobra-F64 (which is a generic name for Cobra-F64a and Cobra-F64b) are 128-bit and 64-bit iterated block ciphers with a 128-bit key size based on such DDPs, respectively. Unlike the predecessor DDP-based ciphers [16,5], Cobra-S128 is a software-oriented cipher and Cobra-F64 is a firmware-suitable cipher. In this paper, we derive several structural properties of Cobra-S128 and Cobra-F64 and then use them to devise key recovery attacks on Cobra-S128 and Cobra-F64. These works are the first known attacks on Cobra-S128 and Cobra-F64.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom