In this paper we show that the full-round Eagle-64 and Eagle-128 are vulnerable to the related-key amplified boomerang attack. The attack on the full-round Eagle-64 requires 265 full-round Eagle-64 decryptions with 237 related-key chosen ciphertexts, while the attack on the full-round Eagle-128 requires about 2154.51 full-round Eagle-128 encryptions with 294.83 related-key chosen plaintexts. These works are the first known attacks on Eagle-64 and Eagle-128. © Springer-Verlag Berlin Heidelberg 2007.
CITATION STYLE
Jeong, K., Lee, C., Sung, J., Hong, S., & Lim, J. (2007). Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4586 LNCS, pp. 143–157). Springer Verlag. https://doi.org/10.1007/978-3-540-73458-1_12
Mendeley helps you to discover research relevant for your work.