The Design of Rijndael
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Hi-index | 0.00 |
In this paper, we cryptanalyze the Substitution Cipher Chaining mode (SCC-128) [3], which uses three keys. The first key is the encryption key, which we were able to recover with about 240 cipher executions and 5 × 28 chosen plaintexts. The second key is responsible of generation two layers of masks, we recovered the first layer with 213 chosen plaintext and 221 cipher executions and our attack to recover the second layer costs only one known sector plaintext and 64 cipher executions. The third key is used to generate the encrypted sector ID, we were able to recover the encrypted sector ID of a sector with 1 known plaintext and 2 cipher executions for each sector.