Cryptanalysis of substitution cipher chaining mode (SCC)

  • Authors:
  • Mohamed Abo El-Fotouh;Klaus Diepold

  • Affiliations:
  • Institute for Data Processing, Technische Universität München, München, Germany;Institute for Data Processing, Technische Universität München, München, Germany

  • Venue:
  • ICC'09 Proceedings of the 2009 IEEE international conference on Communications
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we cryptanalyze the Substitution Cipher Chaining mode (SCC-128) [3], which uses three keys. The first key is the encryption key, which we were able to recover with about 240 cipher executions and 5 × 28 chosen plaintexts. The second key is responsible of generation two layers of masks, we recovered the first layer with 213 chosen plaintext and 221 cipher executions and our attack to recover the second layer costs only one known sector plaintext and 64 cipher executions. The third key is used to generate the encrypted sector ID, we were able to recover the encrypted sector ID of a sector with 1 known plaintext and 2 cipher executions for each sector.