Related-Key Attacks on Reduced Rounds of SHACAL-2

  • Jongsung Kim
  • Guil Kim
  • Sangjin Lee
  • Jongin Lim
  • Junghwan Song
Conference paper

DOI: 10.1007/978-3-540-30556-9_15

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3348)
Cite this paper as:
Kim J., Kim G., Lee S., Lim J., Song J. (2004) Related-Key Attacks on Reduced Rounds of SHACAL-2. In: Canteaut A., Viswanathan K. (eds) Progress in Cryptology - INDOCRYPT 2004. INDOCRYPT 2004. Lecture Notes in Computer Science, vol 3348. Springer, Berlin, Heidelberg

Abstract

SHACAL-2 is a 256-bit block cipher with up to 512 bits of key length based on the hash function SHA-2. It was submitted to the NESSIE project and was recommended as one of the NESSIE selections. In this paper we present two types of related-key attacks called the related-key differential-(non)linear and the related-key rectangle attacks, and we discuss the security of SHACAL-2 against these two types of attacks. Using the related-key differential-nonlinear attack we can break SHACAL-2 with 512-bit keys up to 35 out of its 64 rounds, and using the related-key rectangle attack we can break SHACAL-2 with 512-bit keys up to 37 rounds.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Jongsung Kim
    • 1
  • Guil Kim
    • 1
  • Sangjin Lee
    • 1
  • Jongin Lim
    • 1
  • Junghwan Song
    • 2
  1. 1.Center for Information Security Technologies(CIST)Korea UniversitySeoulKorea
  2. 2.Department of MathematicsHanyang UniversitySeoul

Personalised recommendations