Browse > Article
http://dx.doi.org/10.13089/JKIISC.2004.14.3.107

Impossible Differential Attack on 30-Round SHACAL-2  

홍석희 (고려대학교 정보보호기술연구센터)
김종성 (고려대학교 정보보호기술연구센)
김구일 (고려대학교 정보보호기술연구센)
이창훈 (고려대학교 정보보호기술연구센)
성재철 (서울시립대학교 수학)
이상진 (고려대학교 정보보호기술연구센터)
Abstract
SHACAL-2 is a 256 bit block cipher with various key sizes based on the hash function SHA-2. Recently, it was recommended as one of the NESSIE selections. UP to now, no security flaws have been found in SHACAL-2. In this paper, we discuss the security of SHACAL-2 against an impossible differential attack. We propose two types of 14 round impossible characteristics and using them we attack 30 round SHACAL-2 with 512 bit 18y. This attack requires 744 chosen plaintexs and has time complexity of 2$^{495.1}$ 30 round SHACAL-2 encryptions.
Keywords
SHACLA-2; IDC(Impossible differential cryptanalysis); NESSIE; SHA-2;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials /
[ E.Biham;A.Biryukov;A.Shamir ] / Advances in Cryptology-EUROCRYPT'99, LNCS 1592
2 Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA /
[ D.J.Moon;K.D.Hwang;W.I.Lee;S.J.Lee;J.I.Lim ] / FSE 2002. LNCS 2365
3 SHACAL:A Family of Block Ciphers /
[ H.Handschuh;D.Naccache ] / Submission to the NESSIE project
4 /
[ U.S.Department of Commerce ] / FIPS 180-2:Secure Hash Standard