The related-key rectangle attack - Application to SHACAL-1

Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, Dowon Hong

Research output: Chapter in Book/Report/Conference proceedingChapter

46 Citations (Scopus)

Abstract

The rectangle attack and the related-key attack on block ciphers are well-known to be very powerful. In this paper we combine the rectangle attack with the related-key attack. Using this combined attack we can attack the SHACAL-1 cipher with 512-bit keys up to 59 out of its 80 rounds. Our 59-round attack requires a data complexity of 2149.72 chosen plaintexts and a time complexity of 2498.30 encryptions, which is faster than exhaustive search.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
EditorsHuaxiong Wang, Josef Pieprzyk, Vijay Varadharajan
PublisherSpringer Verlag
Pages123-136
Number of pages14
ISBN (Print)9783540223795
DOIs
Publication statusPublished - 2004

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3108
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Keywords

  • Block Ciphers
  • SHACAL-1
  • The Rectangle Attack
  • The Related-Key Attack
  • The Related-Key Rectangle Attack

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'The related-key rectangle attack - Application to SHACAL-1'. Together they form a unique fingerprint.

  • Cite this

    Kim, J., Kim, G., Hong, S., Lee, S., & Hong, D. (2004). The related-key rectangle attack - Application to SHACAL-1. In H. Wang, J. Pieprzyk, & V. Varadharajan (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 123-136). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3108). Springer Verlag. https://doi.org/10.1007/978-3-540-27800-9_11