Browse > Article
http://dx.doi.org/10.13089/JKIISC.2005.15.1.57

Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2  

Kim Guil (Center for Information Security Technologies, Korea University)
Kim Jongsung (Center for Information Security Technologies, Korea University)
Hong Seokhie (Center for Information Security Technologies, Korea University)
Lee Sangjin (Center for Information Security Technologies, Korea University)
Lim Jongin (Center for Information Security Technologies, Korea University)
Abstract
SHACAL-2 is a 256-bit block cipher with various key sizes based on the hash function SHA-2. Recently, it was recommended as one of the NESSIE selections. This paper presents differential-linear type attacks on SHACAL-2 with 512-bit keys up to 32 out of its 64 rounds. Our 32-round attack on the 512-bit keys variants is the best efficient attack on this cipher in published literatures.
Keywords
Differential Attack; Linear Attack; Differential-Linear Attack; SHACAL-2;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 J. Daeman L. R. Knudsen and V. Rijndael, 'The block cipher Square,' FSE'97, LNCS 1267, pp. 149-165, Springer-Verlag, 1997
2 A. A. Selcuk and A. Bicak, 'On Probability of Success in Linear and Differential Cryptanalysis,' SCN'02, LNCS 2576, pp. 174-185, Springer-Verlag, 2002
3 홍석희, 김종성, 김구일, 이창훈, 성재철, 이상진, '30 라운드 SHACAL-2의 불능 차분 공격,' 정보보호학회논문지, 14(3), pp. 107-115, June, 2004
4 S. K. Langford and M. E. Hellman, 'Differential-Linear Cryptanalysis,' Advances in Cryptology - CRYPTO'94, LNCS 839, pp. 17-25, Springer-Verlag, 1994
5 M. Matsui, 'Linear Cryptanalysis Method for DES Cipher,' Advances in Cryptology - EUROCRYPT'93, LNCS 765, pp. 386-397, Springer-Verlag, 1994
6 H. Handschuh and D. Naccache, 'SHACAL : A Family of Block Ciphers,' Submission to the NESSIE project, 2002
7 E. Biham, O. Dunkelman and N. Keller, 'Enhanced Differential-Linear Cryptanalysis,' Advances in Cryptology - ASIACRYPT'02, LNCS 2501, pp. 254-266, Springer-Verlag, 2002
8 E. Biham and A. Shamir, 'Differential cryptanalysis of the full 16-round DES,' Advances in Cryptology - CRYPTO'92, LNCS 740, pp. 487-496, Springer-Verlag, 1992
9 U.S. Department of Commerce. FIPS 180-2 : Secure Hash Standard, Federal Information Processing Standards Publication, N.I.S.T., August 2002