Abstract
SHACAL is a 160-bit block cipher based on the hash standard SHA-1, as a submission to NESSIE. SHACAL uses the XOR, modular addition operation and the functions of bit-by-bit manner. These operations and functions make the differential cryptanalysis difficult, i.e, it is hard to find a long differential characteristic with high probability. But, we can find short differential characteristics with high probabilities. Using this fact, we discuss the security of SHACAL against an amplified boomerang attack. We find a 36-step boomerang-distinguisher and present attacks on reduced-round SHACAL with various key sizes. We can attack 39-step SHACAL with 256-bit key, and 47-step SHACAL with 512-bit key. In addition, we present differential attacks of reduced-round SHACAL with various key sizes.
Chapter PDF
Similar content being viewed by others
References
E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.
E. Biham, O. Dunkelman and N. Keller, The Rectangle Attack-Rectangling the Serpent, Proc. of Euro crypt’2001, Springer-Verlag, LNCS 2045, pp. 340–357, 2001
H. Handschuh, D. Naccache, SHACAL, In Proceedings of the First Open NESSIE Workshop, November 2000.
H. Handschuh, D. Naccache, SHACAL, NESSIE project, October 2001.
H. Handschuh, L. R. Knudsen, and M. J. Robshaw Analysis of SHA-1 in Encryption Mode, CT-RSA 2001, Springer-Verlag, LNCS 2020, pp. 70–83, 2001.
J. Kelsey, T. Kohno, and B. Schneier, Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent, Proc. of FSE’2000, Springer-Verlag, LNCS 1978, pp. 75–93, 2001
J. Nakahara Jr, The Statistical Evaluation of the NESSIE Submission, October 2001.
David Wagner, The boomerang Attack, proceedings of Fast Software Encryption, Lecture Notes in Computer Science 1636, pp. 156–170, Springer-Verlag, 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, J., Moon, D., Lee, W., Hong, S., Lee, S., Jung, S. (2002). Amplified Boomerang Attack against Reduced-Round SHACAL. In: Zheng, Y. (eds) Advances in Cryptology — ASIACRYPT 2002. ASIACRYPT 2002. Lecture Notes in Computer Science, vol 2501. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36178-2_15
Download citation
DOI: https://doi.org/10.1007/3-540-36178-2_15
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00171-3
Online ISBN: 978-3-540-36178-7
eBook Packages: Springer Book Archive