The Retracing Boomerang Attack, with Application to Reduced-Round AES

被引:0
|
作者
Dunkelman, Orr [1 ]
Keller, Nathan [2 ]
Ronen, Eyal [3 ]
Shamir, Adi [4 ]
机构
[1] Univ Haifa, Comp Sci Dept, Hefa, Israel
[2] Bar Ilan Univ, Dept Math, Ramat Gan, Israel
[3] Tel Aviv Univ, Sch Comp Sci, Tel Aviv, Israel
[4] Weizmann Inst Sci, Fac Math & Comp Sci, Rehovot, Israel
基金
欧洲研究理事会;
关键词
Boomerang attack; Yoyo; Mixture differentials; Rectangle attack; AES; Secret S-box; RECTANGLE ATTACK; CRYPTANALYSIS;
D O I
10.1007/s00145-024-09512-7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Boomerang attacks are extensions of differential attacks that make it possible to combine two unrelated differential properties of the first and second part of a cryptosystem with probabilities p and q into a new differential-like property of the whole cryptosystem with probability p2q2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$p<^>2q<^>2$$\end{document} (since each one of the properties has to be satisfied twice). In this paper, we describe a new version of boomerang attacks which uses the counterintuitive idea of throwing out most of the data in order to force equalities between certain values on the ciphertext side. In certain cases, this creates a correlation between the four probabilistic events, which increases the probability of the combined property to p2q\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$p<^>2q$$\end{document} and increases the signal-to-noise ratio of the resultant distinguisher. We call this variant a retracing boomerang attack since we make sure that the boomerang we throw follows the same path on its forward and backward directions. To demonstrate the power of the new technique, we apply it to the case of 5-round AES. This version of AES was repeatedly attacked by a large variety of techniques, but for twenty years its complexity had remained stuck at 232\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2<^>{32}$$\end{document}. At Crypto'18, it was finally reduced to 224\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2<^>{24}$$\end{document} (for full key recovery), and with our new technique, we can further reduce the complexity of full key recovery to the surprisingly low value of 216.5\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2<^>{16.5}$$\end{document} (i.e., only 90, 000 encryption/decryption operations are required for a full key recovery). In addition to improving previous attacks, our new technique unveils a hidden relationship between boomerang attacks and two other cryptanalytic techniques, the yoyo game and the recently introduced mixture differentials.
引用
收藏
页数:42
相关论文
共 50 条
  • [21] Remarks on Mixture and Yoyo Distinguishers for Reduced-Round AES
    Duan, Chunhui
    Tan, Lin
    Qi, Wenfeng
    2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2020), 2020, : 807 - 815
  • [22] Sandwich-Boomerang attack on reduced round CLEFIA
    Mao, Ming
    Qin, Zhiguang
    High Technology Letters, 2014, 20 (01) : 48 - 53
  • [23] Key-Recovery Attack on Reduced-Round AES-128 Using the Exchange-Equivalence
    Zhang L.
    Wu W.
    Zhang L.
    Zheng Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2213 - 2221
  • [24] Sandwich-Boomerang attack on reduced round CLEFIA
    毛明
    Qin Zhiguang
    HighTechnologyLetters, 2014, 20 (01) : 48 - 53
  • [25] Cube Attack on Reduced-Round Enhanced-Bivium
    Zhang, Shiyong
    Chen, Gongliang
    Li, Jianhua
    2016 INTERNATIONAL CONFERENCE ON SECURITY OF SMART CITIES, INDUSTRIAL CONTROL SYSTEM AND COMMUNICATIONS (SSIC), 2016,
  • [26] A meet-in-the-middle attack on reduced-round ARIA
    Tang, Xuehai
    Sun, Bing
    Li, Ruilin
    Li, Chao
    Yin, Juhua
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (10) : 1685 - 1692
  • [27] Zero-correlation linear attack on reduced-round SKINNY
    Zhang, Yi
    Cui, Ting
    Wang, Congjun
    FRONTIERS OF COMPUTER SCIENCE, 2023, 17 (04)
  • [28] Conditional Cube Attack on Reduced-Round Keccak Sponge Function
    Huang, Senyang
    Wang, Xiaoyun
    Xu, Guangwu
    Wang, Meiqin
    Zhao, Jingyuan
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II, 2017, 10211 : 259 - 288
  • [29] Zero-correlation linear attack on reduced-round SKINNY
    ZHANG Yi
    CUI Ting
    WANG Congjun
    Frontiers of Computer Science, 2023, 17 (04)
  • [30] Related-Tweakey Boomerang and Rectangle Attacks on Reduced-Round Joltik-BC
    Shi, Kangkang
    Ren, Jiongjiong
    Chen, Shaozhen
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024, 2025, 15053 : 94 - 111