Impossible differential attack on 30-round SHACAL-2

Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee

Research output: Contribution to journalArticle

16 Citations (Scopus)


SHACAL-2 is a 256-bit block cipher with various key sizes based on the hash function SHA-2. Recently, it was recommended as one of the NESSIE selections. Up to now, no security flaws have been found in SHACAL-2. In this paper, we discuss the security of SHACAL-2 against an impossible differential attack. We propose two types of 14-round impossible characteristics and using them, we attack 30-round SHACAL-2 with 512-bit key. This attack requires 744 chosen plaintexts and has time complexity of 2495.1 30-round SHACAL-2 encryptions.

Original languageEnglish
Pages (from-to)97-106
Number of pages10
JournalLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Publication statusPublished - 2003 Dec 1



  • Block Cipher
  • Impossible Differential Attack
  • SHACAL-2

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this