Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128

In this paper we show that the full-round Eagle-64 and Eagle- 128 are vulnerable to the related-key amplified boomerang attack. The attack on the full-round Eagle-64 requires 265 full-round Eagle-64 decryptions with 237 related-key chosen ciphertexts, while the attack on the fullround Eagle-128 requires about 2154.51 full-round Eagle-128 encryptions with 294.83 related-key chosen plaintexts. These works are the first known attacks on Eagle-64 and Eagle-128.

[1]  Jongsung Kim,et al.  Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b , 2006, SCN.

[2]  Ronald Cramer,et al.  Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.

[3]  Nikolay A. Moldovyan,et al.  New Class of Cryptographic Primitives and Cipher Design for Networks Security , 2006, Int. J. Netw. Secur..

[4]  Sangjin Lee,et al.  A Chosen Plaintext Linear Attack on Block Cipher CIKS-1 , 2002, ICICS.

[5]  Victor A. Skormin,et al.  Information Assurance in Computer Networks , 2001, Lecture Notes in Computer Science.

[6]  Gerhard Goos,et al.  Fast Software Encryption , 2001, Lecture Notes in Computer Science.

[7]  O. Koufopavlou,et al.  A new DDP based cipher CIKS-128h architecture design LSI implementation optimization of CBC encryption hashing over 1Gbps , 2003, 2003 46th Midwest Symposium on Circuits and Systems.

[8]  Seokhie Hong,et al.  Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H , 2004, INDOCRYPT.

[9]  Nikolay A. Moldovyan,et al.  Fast Encryption Algorithm Spectr-H64 , 2001, MMM-ACNS.

[10]  Aggelos Kiayias,et al.  Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers , 2005, Mycrypt.

[11]  Colin Boyd,et al.  Cryptography and Coding , 1995, Lecture Notes in Computer Science.

[12]  N.D. Goots,et al.  Fast DDP-based ciphers: from hardware to software , 2003, 2003 46th Midwest Symposium on Circuits and Systems.

[13]  Jongsung Kim,et al.  Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b , 2005, Mycrypt.

[14]  Nikolay A. Moldovyan,et al.  A cipher based on data-dependent permutations , 2001, Journal of Cryptology.

[15]  Jongsung Kim,et al.  Related-Key Differential Attacks on Cobra-H64 and Cobra-H128 , 2005, IMACC.

[16]  Odysseas G. Koufopavlou,et al.  High Speed Networking Security: Design and Implementation of Two New DDP-Based Ciphers , 2005, Mob. Networks Appl..

[17]  Seokhie Hong,et al.  Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1 , 2004, ACISP.

[18]  Eli Biham,et al.  Related-Key Boomerang and Rectangle Attacks , 2005, EUROCRYPT.

[19]  Computer Network Security , 2005 .

[20]  Jongsung Kim,et al.  Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192 , 2005, FSE.

[21]  Anne Canteaut,et al.  Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings , 2004, INDOCRYPT.

[22]  Information Security and Privacy , 1996, Lecture Notes in Computer Science.

[23]  Seokhie Hong,et al.  Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property , 2003, MMM-ACNS.