@inbook{b517977c05714b2b9f7f50a60c65aee3,
title = "The related-key rectangle attack - Application to SHACAL-1",
abstract = "The rectangle attack and the related-key attack on block ciphers are well-known to be very powerful. In this paper we combine the rectangle attack with the related-key attack. Using this combined attack we can attack the SHACAL-1 cipher with 512-bit keys up to 59 out of its 80 rounds. Our 59-round attack requires a data complexity of 2149.72 chosen plaintexts and a time complexity of 2498.30 encryptions, which is faster than exhaustive search.",
keywords = "Block Ciphers, SHACAL-1, The Rectangle Attack, The Related-Key Attack, The Related-Key Rectangle Attack",
author = "Jongsung Kim and Guil Kim and Seokhie Hong and Sangjin Lee and Dowon Hong",
year = "2004",
doi = "10.1007/978-3-540-27800-9_11",
language = "English",
isbn = "9783540223795",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "123--136",
editor = "Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
}