Browse > Article
http://dx.doi.org/10.13089/JKIISC.2004.14.5.57

Related-Key Rectangle Attacks on Reduced Rounds of SHACAL-1  

김종성 (고려대학교 정보보호기술연구센터)
김구일 (고려대학교 정보보호기술연구센터)
홍석희 (고려대학교 정보보호기술연구센터)
이상진 (고려대학교 정보보호기술연구센터)
Abstract
The rectangle attack and the related-key attack on block ciphers are well-known to be very powerful. In this paper we combine the rectangle attack with the related-key attack. Using this combined attack we can attack the SHACAL-1 cipher with 512-bit keys up to 59 out of its 80 rounds. Our 59-round attack requires a data complexity of $2^{149.72}$ chosen plaintexts and a time complexity of $2^{498.30}$ encryptions, which is faster than exhaustive search.
Keywords
Related-Key Rectangle Attack; SHACAL-1;
Citations & Related Records
연도 인용수 순위
  • Reference
1 E. Biham, A. Biryukov and A. Shamir, 'Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials.' Advances in Cryptology-EUROCRYPT' 99. LNCS 1592. pp. 12-23. Springer-Verlag. 1999
2 S. Hong. J. Kim. G. Kim, J. Sung. C. Lee and S. Lee. 'Impossible Differential Attack on 30-round SHACAL-2.' Advances in Cryptology-INDOCRYPT '03, LNCS 2904. pp. 97-106. Springer-Verlag. 2003
3 J. Kelsey. B. Schneier and D. Wagner. 'Key Schedule Cryptanalysis of IDEA. G-DES. GOST. SAFER. and Triple-DES.'Advances in Cryptology-CRYPTO' 96. LNCS 1109. pp. 237-251. Springer-Verlag. 1996
4 J. Kelsey. B. Schneier and D. Wagner.' Related Key Cryptanalysis of 3-WAY. Biham-DES. CAST. DES-X. NewDES. RC2. and TEA,' Advances in Cryptology - ICICS'97, LNCS 1334, pp. 223-246, Springer-Verlag. 1997
5 J. Kelsey. T. Kohno, and B. Schneier. 'Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent,' Advances in Cryptology-FSE'01. LNCS 1978. pp. 75-93, Springer-Verlag. 2001
6 L.R. Knudsen. 'Truncated and Higher Order Differenatials.' Advances in Cryptology - FSE'96, LNCS 1039. pp. 196-211. Springer-Verlag, 1996
7 U.S. Department of Commerce.FIPS 180-1: Secure Hash Standard .Federal Information Processing Standards Publication. N.I.S.T .. April 1995
8 E. Biham and A. Shamir, 'Differential cryptanalysis of DES-like Cryptosysterns,' Advances in Cryptology-CRYPTO' 90. LNCS 537. pp. 2-21. Springer-Verlag. 1990
9 E. Biham. O. Dunkelman and N. Keller. 'The Rectangle Attack-Rectangling the Serpent.' Advances in Cryptology-EUROCRYPT' 01. LNCS 2045. pp. 340-357. Springer-Verlag. 2001
10 D. Wagner. 'The Boomerang Attack.' Advances in Cryptology-FSE'99. LNCS 1636. pp. 156-170. Springer-Verlag. 1999
11 김종성, 문덕재, 이원일, 홍석희, 이상진, 'SHACAL의 축소 라운드에 대한 확장된 부메랑 공격.' 정보보호학회논문지, 12(5), pp. 97-93, October. 2002.
12 E. Biham. 'New Types of Cryptanalytic Attacks Using Related Keys,' Journal of Cryptology, v, 7, n. 4, pp. 229-246. 1994
13 E. Biham. O. Dunkelman and N. Keller. 'Rectangle Attacks on 49-Round SHACAL-1.' Advances in Cryptology-FSE '03. LNCS 2887. pp. 22-35. Springer- Verlag. 2003.
14 G. Jakimoski and Y. Desmedt. 'Related Key Differential Cryptanalysis of 192-bit Key AES Variants.' SAC'03. To appear.
15 Y. Ko. S. Hong. W. Lee, S. Lee and J. Kang. 'Related Key Differential Attacks on 26 rounds of XTEA and Full Rounds of GOST.' FSE'04, To appear.
16 M. Blunden and A. Escott. 'Related Key Attacks on Reduced Round KASUMI,' Advances in Cryptology-FSE '01. LNCS 2355. pp. 277-285. Springer- Verlag. 2001.
17 H. Handschuh and D. Naccache. 'SHACAL: A Family of Block Ciphers.' Submission to the NESSIE project. 2000