Related-key boomerang and rectangle attacks

被引:0
|
作者
Biham, E [1 ]
Dunkelman, O
Keller, N
机构
[1] Technion Israel Inst Technol, Dept Comp Sci, IL-32000 Haifa, Israel
[2] Hebrew Univ Jerusalem, Einstein Inst Math, IL-91904 Jerusalem, Israel
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The boomerang attack and the rectangle attack are two attacks that utilize differential cryptanalysis in a larger construction. Both attacks treat the cipher as a cascade of two sub-ciphers, where there exists a good differential for each sub-cipher, but not for the entire cipher. In this paper we combine the boomerang (and the rectangle) attack with related-key differentials. The new combination is applicable to many ciphers, and we demonstrate its strength by introducing attacks on reduced-round versions of AES and IDEA. The attack on 192-bit key 9-round AES uses 256 different related keys. The 6.5-round attack on IDEA uses four related keys (and has time complexity of 2(88.1) encryptions). We also apply these techniques to COCONUT98 to obtain a distinguisher that requires only four related-key adaptive chosen plaintexts and ciphertexts. For these ciphers, our results attack larger number of rounds or have smaller complexities then all previously known attacks.
引用
收藏
页码:507 / 525
页数:19
相关论文
共 50 条
  • [41] Related-key rectangle attack on 36 rounds of the XTEA block cipher
    Jiqiang Lu
    International Journal of Information Security, 2009, 8 : 1 - 11
  • [42] Related-key rectangle attack on 36 rounds of the XTEA block cipher
    Lu, Jiqiang
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (01) : 1 - 11
  • [43] Related-Key Differential Attacks on CHESS-64
    Luo, Wei
    Guo, Jiansheng
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (09): : 3266 - 3285
  • [44] Cryptography Secure against Related-Key Attacks and Tampering
    Bellare, Mihir
    Cash, David
    Miller, Rachel
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 486 - +
  • [45] Anonymous Signcryption against Linear Related-Key Attacks
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 165 - 183
  • [46] Related-Key Differential Attacks on COSB-128
    Song Dat Phuc Tran
    Lee, Changhoon
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [47] Public-Key Encryption Resilient to Linear Related-Key Attacks
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 182 - 196
  • [48] Signcryption Secure Against Linear Related-Key Attacks
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    COMPUTER JOURNAL, 2014, 57 (10): : 1472 - 1483
  • [49] The (related-key) impossible boomerang attack and its application to the AES block cipher
    Lu, Jiqiang
    DESIGNS CODES AND CRYPTOGRAPHY, 2011, 60 (02) : 123 - 143
  • [50] The (related-key) impossible boomerang attack and its application to the AES block cipher
    Jiqiang Lu
    Designs, Codes and Cryptography, 2011, 60 : 123 - 143