Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128

Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jong In Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

In this paper we show that the full-round Eagle-64 and Eagle-128 are vulnerable to the related-key amplified boomerang attack. The attack on the full-round Eagle-64 requires 265 full-round Eagle-64 decryptions with 237 related-key chosen ciphertexts, while the attack on the full-round Eagle-128 requires about 2154.51 full-round Eagle-128 encryptions with 294.83 related-key chosen plaintexts. These works are the first known attacks on Eagle-64 and Eagle-128.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages143-157
Number of pages15
Volume4586 LNCS
Publication statusPublished - 2007 Dec 1
Event12th Australasian Conference on Information Security and Privacy, ACISP2007 - Townsville, Australia
Duration: 2007 Jul 22007 Jul 4

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4586 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other12th Australasian Conference on Information Security and Privacy, ACISP2007
CountryAustralia
CityTownsville
Period07/7/207/7/4

Fingerprint

Eagles
Cryptography
Attack
Encryption

Keywords

  • Block Ciphers
  • Data-dependent operations
  • Eagle-128
  • Eagle-64
  • Related-key amplified Boomerang attack

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Jeong, K., Lee, C., Sung, J., Hong, S., & Lim, J. I. (2007). Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4586 LNCS, pp. 143-157). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4586 LNCS).

Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128. / Jeong, Kitae; Lee, Changhoon; Sung, Jaechul; Hong, Seokhie; Lim, Jong In.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4586 LNCS 2007. p. 143-157 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4586 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jeong, K, Lee, C, Sung, J, Hong, S & Lim, JI 2007, Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 4586 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4586 LNCS, pp. 143-157, 12th Australasian Conference on Information Security and Privacy, ACISP2007, Townsville, Australia, 07/7/2.
Jeong K, Lee C, Sung J, Hong S, Lim JI. Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4586 LNCS. 2007. p. 143-157. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Jeong, Kitae ; Lee, Changhoon ; Sung, Jaechul ; Hong, Seokhie ; Lim, Jong In. / Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4586 LNCS 2007. pp. 143-157 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{d81ed81632a94b61a6cb27781efbb397,
title = "Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128",
abstract = "In this paper we show that the full-round Eagle-64 and Eagle-128 are vulnerable to the related-key amplified boomerang attack. The attack on the full-round Eagle-64 requires 265 full-round Eagle-64 decryptions with 237 related-key chosen ciphertexts, while the attack on the full-round Eagle-128 requires about 2154.51 full-round Eagle-128 encryptions with 294.83 related-key chosen plaintexts. These works are the first known attacks on Eagle-64 and Eagle-128.",
keywords = "Block Ciphers, Data-dependent operations, Eagle-128, Eagle-64, Related-key amplified Boomerang attack",
author = "Kitae Jeong and Changhoon Lee and Jaechul Sung and Seokhie Hong and Lim, {Jong In}",
year = "2007",
month = "12",
day = "1",
language = "English",
isbn = "3540734570",
volume = "4586 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "143--157",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128

AU - Jeong, Kitae

AU - Lee, Changhoon

AU - Sung, Jaechul

AU - Hong, Seokhie

AU - Lim, Jong In

PY - 2007/12/1

Y1 - 2007/12/1

N2 - In this paper we show that the full-round Eagle-64 and Eagle-128 are vulnerable to the related-key amplified boomerang attack. The attack on the full-round Eagle-64 requires 265 full-round Eagle-64 decryptions with 237 related-key chosen ciphertexts, while the attack on the full-round Eagle-128 requires about 2154.51 full-round Eagle-128 encryptions with 294.83 related-key chosen plaintexts. These works are the first known attacks on Eagle-64 and Eagle-128.

AB - In this paper we show that the full-round Eagle-64 and Eagle-128 are vulnerable to the related-key amplified boomerang attack. The attack on the full-round Eagle-64 requires 265 full-round Eagle-64 decryptions with 237 related-key chosen ciphertexts, while the attack on the full-round Eagle-128 requires about 2154.51 full-round Eagle-128 encryptions with 294.83 related-key chosen plaintexts. These works are the first known attacks on Eagle-64 and Eagle-128.

KW - Block Ciphers

KW - Data-dependent operations

KW - Eagle-128

KW - Eagle-64

KW - Related-key amplified Boomerang attack

UR - http://www.scopus.com/inward/record.url?scp=38149081304&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=38149081304&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:38149081304

SN - 3540734570

SN - 9783540734574

VL - 4586 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 143

EP - 157

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -