Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128

Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

In this paper we show that the full-round Eagle-64 and Eagle-128 are vulnerable to the related-key amplified boomerang attack. The attack on the full-round Eagle-64 requires 265 full-round Eagle-64 decryptions with 237 related-key chosen ciphertexts, while the attack on the full-round Eagle-128 requires about 2154.51 full-round Eagle-128 encryptions with 294.83 related-key chosen plaintexts. These works are the first known attacks on Eagle-64 and Eagle-128.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 12th Australasian Conference, ACISP 2007, Proceedings
PublisherSpringer Verlag
Pages143-157
Number of pages15
ISBN (Print)3540734570, 9783540734574
DOIs
Publication statusPublished - 2007
Event12th Australasian Conference on Information Security and Privacy, ACISP2007 - Townsville, Australia
Duration: 2007 Jul 22007 Jul 4

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4586 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other12th Australasian Conference on Information Security and Privacy, ACISP2007
Country/TerritoryAustralia
CityTownsville
Period07/7/207/7/4

Keywords

  • Block Ciphers
  • Data-dependent operations
  • Eagle-128
  • Eagle-64
  • Related-key amplified Boomerang attack

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128'. Together they form a unique fingerprint.

Cite this