Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128

Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Scopus citations

Abstract

In this paper we show that the full-round Eagle-64 and Eagle-128 are vulnerable to the related-key amplified boomerang attack. The attack on the full-round Eagle-64 requires 265 full-round Eagle-64 decryptions with 237 related-key chosen ciphertexts, while the attack on the full-round Eagle-128 requires about 2154.51 full-round Eagle-128 encryptions with 294.83 related-key chosen plaintexts. These works are the first known attacks on Eagle-64 and Eagle-128.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 12th Australasian Conference, ACISP 2007, Proceedings
PublisherSpringer Verlag
Pages143-157
Number of pages15
ISBN (Print)3540734570, 9783540734574
DOIs
StatePublished - 2007
Event12th Australasian Conference on Information Security and Privacy, ACISP2007 - Townsville, Australia
Duration: 2 Jul 20074 Jul 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4586 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference12th Australasian Conference on Information Security and Privacy, ACISP2007
Country/TerritoryAustralia
CityTownsville
Period2/07/074/07/07

Keywords

  • Block Ciphers
  • Data-dependent operations
  • Eagle-128
  • Eagle-64
  • Related-key amplified Boomerang attack

Fingerprint

Dive into the research topics of 'Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128'. Together they form a unique fingerprint.

Cite this