• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zheng Yafei, Wei Hongru. Biclique Cryptanalysis of Block Cipher SHACAL2[J]. Journal of Computer Research and Development, 2014, 51(10): 2329-2335. DOI: 10.7544/issn1000-1239.2014.20130639
Citation: Zheng Yafei, Wei Hongru. Biclique Cryptanalysis of Block Cipher SHACAL2[J]. Journal of Computer Research and Development, 2014, 51(10): 2329-2335. DOI: 10.7544/issn1000-1239.2014.20130639

Biclique Cryptanalysis of Block Cipher SHACAL2

More Information
  • Published Date: September 30, 2014
  • SHACAL2 is a block cipher designed by Handschuh H. et al based on the standard Hash function SHA2 in 2002. It one of the European standard block ciphers, and has relatively high security because of its long block length and key length, which are 256b and 512b respectively. There have been a few security analysis results about SHACAL2, such as impossible differential cryptanalysis and related-key rectangle attack on reduced rounds of SHACAL2. Taking advantage of the characteristics of the key schedule and the permutation layer of block cipher SHACAL2, 18-round 32-dimensional Biclique of the first eight rounds of SHACAL2 is constructed. Based on the Biclique constructed, Biclique attack is applied to the whole 64-round SHACAL2. And the results show that, using Biclique attack to recover the whole 512b key information of 64-round SHACAL2, the data complexity is no more than 2\+{224} chosen plaintexts, and the time complexity is 2\+{511.18} 64-round encryptions. Compared with the known analysis results, the data complexity of Biclique attack decreased obviously, and the time complexity is better than exhaustive search. For whole round SHACAL2,Biclique attack is a relatively effective method. This is the first single-key attack for whole round SHACAL2.
  • Related Articles

    [1]He Jianhao, Li Lüzhou. An Overview of Quantum Optimization[J]. Journal of Computer Research and Development, 2021, 58(9): 1823-1834. DOI: 10.7544/issn1000-1239.2021.20210276
    [2]Xu Wenpeng, Wang Weiming, Li Hang, Yang Zhouwang, Liu Xiuping, Liu Ligang. Topology Optimization for Minimal Volume in 3D Printing[J]. Journal of Computer Research and Development, 2015, 52(1): 38-44. DOI: 10.7544/issn1000-1239.2015.20140108
    [3]Wen Renqiang, Zhong Shaobo, Yuan Hongyong, Huang Quanyi. Emergency Resource Multi-Objective Optimization Scheduling Model and Multi-Colony Ant Optimization Algorithm[J]. Journal of Computer Research and Development, 2013, 50(7): 1464-1472.
    [4]Wu Jianhui, Zhang Jing, Li Renfa, Liu Zhaohua. A Multi-Subpopulation PSO Immune Algorithm and Its Application on Function Optimization[J]. Journal of Computer Research and Development, 2012, 49(9): 1883-1898.
    [5]Tang Kezong, Liu Bingxiang, Yang Jingyu, Sun Tingkai. Double Center Particle Swarm Optimization Algorithm[J]. Journal of Computer Research and Development, 2012, 49(5): 1086-1094.
    [6]Sun Dayang, Liu Yanheng, Yang Dong, Wang Aimin. Lifetime Optimizing Scheme of WSN[J]. Journal of Computer Research and Development, 2012, 49(1): 193-201.
    [7]Liu Chun'an, Wang Yuping. Dynamic Multi-Objective Optimization Evolutionary Algorithm Based on New Model[J]. Journal of Computer Research and Development, 2008, 45(4): 603-611.
    [8]Cui Zhendong, Wang Xicheng. Optimization Design of Turbine Engine Foundation on Grid[J]. Journal of Computer Research and Development, 2007, 44(10): 1652-1660.
    [9]Ma Ming, Zhou Chunguang, Zhang Libiao, Ma Jie. Fuzzy Neural Network Optimization by a Multi-Objective Particle Swarm Optimization Algorithm[J]. Journal of Computer Research and Development, 2006, 43(12): 2104-2109.
    [10]Lei Kaiyou and Qiu Yuhui. A Study of Constrained Layout Optimization Using Adaptive Particle Swarm Optimizer[J]. Journal of Computer Research and Development, 2006, 43(10): 1724-1731.
  • Cited by

    Periodical cited type(2)

    1. 张皓宇,单薇薇,方晓,王艳. 基于云桌面技术的虚拟专用网络动态资源分配方法. 电子设计工程. 2021(15): 189-193 .
    2. 刘思,张德干,刘晓欢,张婷,吴昊. 一种基于判定区域的AODV路由的自适应修复算法. 计算机研究与发展. 2020(09): 1898-1910 . 本站查看

    Other cited types(0)

Catalog

    Article views (1366) PDF downloads (853) Cited by(2)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return