Movatterモバイル変換


[0]ホーム

URL:


IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
Regular Section
Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis
Jiqiang LUJongsung KIM
Author information
  • Jiqiang LU

    Information Security Group, Royal Holloway, University of London
    The Institute of Electronics, Information and Communication Engineers

  • Jongsung KIM

    Center for Information Security Technologies (CIST), Korea University

Corresponding author

ORCID
Keywords:block cipher,SHACAL-2,differential cryptanalysis,related-key rectangle attack
JOURNALRESTRICTED ACCESS

2008 Volume E91.AIssue 9Pages 2588-2596

DOIhttps://doi.org/10.1093/ietfec/e91-a.9.2588
Details
  • Published: September 01, 2008Received: January 28, 2008Available on J-STAGE: March 01, 2010Accepted: -Advance online publication: -Revised: -
Download PDF(1917K)
Download citationRIS

(compatible with EndNote, Reference Manager, ProCite, RefWorks)

BIB TEX

(compatible with BibDesk, LaTeX)

Text
How to download citation
Contact us
Article overview
Share
Abstract
SHACAL-2 is a 64-round block cipher with a 256-bit block size and a variable length key of up to 512 bits. It is a NESSIE selected block cipher algorithm. In this paper, we observe that, when checking whether a candidate quartet is useful in a (related-key) rectangle attack, we can check the two pairs from the quartet one after the other, instead of checking them simultaneously; if the first pair does not meet the expected conditions, we can discard the quartet immediately. We next exploit a 35-round related-key rectangle distinguisher with probability 2-460 for the first 35 rounds of SHACAL-2, which is built on an existing 24-round related-key differential and a new 10-round differential. Finally, taking advantage of the above observation, we use the distinguisher to mount a related-key rectangle attack on the first 44 rounds of SHACAL-2. The attack requires 2233 related-key chosen plaintexts, and has a time complexity of 2497.2 computations. This is better than any previously published cryptanalytic results on SHACAL-2 in terms of the numbers of attacked rounds.
References (20)
Related articles (0)
Figures (0)
Content from these authors
Supplementary material (0)
Result List ()
Cited by (1)
© 2008 The Institute of Electronics, Information and Communication Engineers
Previous articleNext article
Favorites & Alerts
Related articles

Recently viewed articles
    Announcements from publisher
    Share this page
    feedback
    Top

    Register with J-STAGE for free!

    Register

    Already have an account? Sign inhere


    [8]ページ先頭

    ©2009-2025 Movatter.jp