Impossible differential attack on 30-round SHACAL-2

Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee

Research output: Contribution to journalArticle

16 Citations (Scopus)

Abstract

SHACAL-2 is a 256-bit block cipher with various key sizes based on the hash function SHA-2. Recently, it was recommended as one of the NESSIE selections. Up to now, no security flaws have been found in SHACAL-2. In this paper, we discuss the security of SHACAL-2 against an impossible differential attack. We propose two types of 14-round impossible characteristics and using them, we attack 30-round SHACAL-2 with 512-bit key. This attack requires 744 chosen plaintexts and has time complexity of 2495.1 30-round SHACAL-2 encryptions.

Original languageEnglish
Pages (from-to)97-106
Number of pages10
JournalLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2904
Publication statusPublished - 2003 Dec 1

Fingerprint

Attack
Hash functions
Cryptography
Block Cipher
Hash Function
Defects
Encryption
Time Complexity

Keywords

  • Block Cipher
  • Impossible Differential Attack
  • SHACAL-2

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science
  • Engineering(all)

Cite this

Impossible differential attack on 30-round SHACAL-2. / Hong, Seokhie; Kim, Jongsung; Kim, Guil; Sung, Jaechul; Lee, Changhoon; Lee, Sangjin.

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 2904, 01.12.2003, p. 97-106.

Research output: Contribution to journalArticle

@article{48b36ca51a734b768ae8cf4cff4f6610,
title = "Impossible differential attack on 30-round SHACAL-2",
abstract = "SHACAL-2 is a 256-bit block cipher with various key sizes based on the hash function SHA-2. Recently, it was recommended as one of the NESSIE selections. Up to now, no security flaws have been found in SHACAL-2. In this paper, we discuss the security of SHACAL-2 against an impossible differential attack. We propose two types of 14-round impossible characteristics and using them, we attack 30-round SHACAL-2 with 512-bit key. This attack requires 744 chosen plaintexts and has time complexity of 2495.1 30-round SHACAL-2 encryptions.",
keywords = "Block Cipher, Impossible Differential Attack, SHACAL-2",
author = "Seokhie Hong and Jongsung Kim and Guil Kim and Jaechul Sung and Changhoon Lee and Sangjin Lee",
year = "2003",
month = "12",
day = "1",
language = "English",
volume = "2904",
pages = "97--106",
journal = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
issn = "0302-9743",
publisher = "Springer Verlag",

}

TY - JOUR

T1 - Impossible differential attack on 30-round SHACAL-2

AU - Hong, Seokhie

AU - Kim, Jongsung

AU - Kim, Guil

AU - Sung, Jaechul

AU - Lee, Changhoon

AU - Lee, Sangjin

PY - 2003/12/1

Y1 - 2003/12/1

N2 - SHACAL-2 is a 256-bit block cipher with various key sizes based on the hash function SHA-2. Recently, it was recommended as one of the NESSIE selections. Up to now, no security flaws have been found in SHACAL-2. In this paper, we discuss the security of SHACAL-2 against an impossible differential attack. We propose two types of 14-round impossible characteristics and using them, we attack 30-round SHACAL-2 with 512-bit key. This attack requires 744 chosen plaintexts and has time complexity of 2495.1 30-round SHACAL-2 encryptions.

AB - SHACAL-2 is a 256-bit block cipher with various key sizes based on the hash function SHA-2. Recently, it was recommended as one of the NESSIE selections. Up to now, no security flaws have been found in SHACAL-2. In this paper, we discuss the security of SHACAL-2 against an impossible differential attack. We propose two types of 14-round impossible characteristics and using them, we attack 30-round SHACAL-2 with 512-bit key. This attack requires 744 chosen plaintexts and has time complexity of 2495.1 30-round SHACAL-2 encryptions.

KW - Block Cipher

KW - Impossible Differential Attack

KW - SHACAL-2

UR - http://www.scopus.com/inward/record.url?scp=0346895382&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0346895382&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:0346895382

VL - 2904

SP - 97

EP - 106

JO - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

JF - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SN - 0302-9743

ER -