TY - GEN
T1 - Amplified boomerang attack against reduced-round shacal
AU - Kim, Jongsung
AU - Moon, Dukjae
AU - Lee, Wonil
AU - Hong, Seokhie
AU - Lee, Sangjin
AU - Jung, Seokwon
N1 - Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 2002.
PY - 2002
Y1 - 2002
N2 - SHACAL is a 160-bit block cipher based on the hash standard SHA-1, as a submission to NESSIE. SHACAL uses the XOR, modular addition operation and the functions of bit-by-bit manner. These operations and functions make the differential cryptanalysis difficult, i.e, it is hard to find a long differential characteristic with high probability. But, we can find short differential characteristics with high probabilities. Using this fact, we discuss the security of SHACAL against an amplified boomerang attack. We find a 36-step boomerang-distinguisher and present attacks on reduced-round SHACAL with various key sizes. We can attack 39-step SHACAL with 256-bit key, and 47-step SHACAL with 512-bit key. In addition, we present differential attacks of reduced-round SHACAL with various key sizes.
AB - SHACAL is a 160-bit block cipher based on the hash standard SHA-1, as a submission to NESSIE. SHACAL uses the XOR, modular addition operation and the functions of bit-by-bit manner. These operations and functions make the differential cryptanalysis difficult, i.e, it is hard to find a long differential characteristic with high probability. But, we can find short differential characteristics with high probabilities. Using this fact, we discuss the security of SHACAL against an amplified boomerang attack. We find a 36-step boomerang-distinguisher and present attacks on reduced-round SHACAL with various key sizes. We can attack 39-step SHACAL with 256-bit key, and 47-step SHACAL with 512-bit key. In addition, we present differential attacks of reduced-round SHACAL with various key sizes.
KW - Amplified boomerang attack
KW - Boomerang-distinguisher
KW - SHACAL
UR - http://www.scopus.com/inward/record.url?scp=84958740228&partnerID=8YFLogxK
U2 - 10.1007/3-540-36178-2_15
DO - 10.1007/3-540-36178-2_15
M3 - Conference contribution
AN - SCOPUS:84958740228
SN - 3540001719
SN - 9783540001713
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 243
EP - 253
BT - Advances in Cryptology - ASIACRYPT 2002 - 8th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
A2 - Zheng, Yuliang
PB - Springer Verlag
T2 - 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002
Y2 - 1 December 2002 through 5 December 2002
ER -