Impossible differential attack on 30-round SHACAL-2

Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee

Research output: Chapter in Book/Report/Conference proceedingChapter

17 Citations (Scopus)

Abstract

SHACAL-2 is a 256-bit block cipher with various key sizes based on the hash function SHA-2. Recently, it was recommended as one of the NESSIE selections. Up to now, no security flaws have been found in SHACAL-2. In this paper, we discuss the security of SHACAL-2 against an impossible differential attack. We propose two types of 14-round impossible characteristics and using them, we attack 30-round SHACAL-2 with 512-bit key. This attack requires 744 chosen plaintexts and has time complexity of 2495.1 30-round SHACAL-2 encryptions.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
EditorsThomas Johansson, Subhamoy Maitra
PublisherSpringer Verlag
Pages97-106
Number of pages10
ISBN (Print)3540206094, 9783540206095
DOIs
Publication statusPublished - 2003

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2904
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Keywords

  • Block Cipher
  • Impossible Differential Attack
  • SHACAL-2

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Impossible differential attack on 30-round SHACAL-2'. Together they form a unique fingerprint.

Cite this