Amplified boomerang attack against reduced-round shacal

Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, Seokwon Jung

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

Abstract

SHACAL is a 160-bit block cipher based on the hash standard SHA-1, as a submission to NESSIE. SHACAL uses the XOR, modular addition operation and the functions of bit-by-bit manner. These operations and functions make the differential cryptanalysis difficult, i.e, it is hard to find a long differential characteristic with high probability. But, we can find short differential characteristics with high probabilities. Using this fact, we discuss the security of SHACAL against an amplified boomerang attack. We find a 36-step boomerang-distinguisher and present attacks on reduced-round SHACAL with various key sizes. We can attack 39-step SHACAL with 256-bit key, and 47-step SHACAL with 512-bit key. In addition, we present differential attacks of reduced-round SHACAL with various key sizes.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherSpringer Verlag
Pages243-253
Number of pages11
Volume2501
ISBN (Print)3540001719, 9783540001713
DOIs
Publication statusPublished - 2002
Event8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002 - Queenstown, New Zealand
Duration: 2002 Dec 12002 Dec 5

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2501
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002
CountryNew Zealand
CityQueenstown
Period02/12/102/12/5

Keywords

  • Amplified boomerang attack
  • Boomerang-distinguisher
  • SHACAL

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Fingerprint Dive into the research topics of 'Amplified boomerang attack against reduced-round shacal'. Together they form a unique fingerprint.

  • Cite this

    Kim, J., Moon, D., Lee, W., Hong, S., Lee, S., & Jung, S. (2002). Amplified boomerang attack against reduced-round shacal. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2501, pp. 243-253). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2501). Springer Verlag. https://doi.org/10.1007/3-540-36178-2_15