Results 161 to 170 of about 10,387 (191)

An Asymmetric Impossible Boomerang Attack on 7-Round AES-128

open access: closedChinese Journal of Computers, 2011
Xiaoli Dong   +3 more
openalex   +3 more sources

The Retracing Boomerang Attack

2020
Boomerang attacks are extensions of differential attacks, that make it possible to combine two unrelated differential properties of the first and second part of a cryptosystem with probabilities p and q into a new differential-like property of the whole cryptosystem with probability \(p^2q^2\) (since each one of the properties has to be satisfied twice)
Orr Dunkelman   +3 more
openaire   +2 more sources

Improved Boomerang Attacks on SM3

2013
The cryptographic hash function SM3 is designed by X. Wang et al. and published by Chinese Commercial Cryptography Administration Office for the use of electronic certification service system in China. It is based on the Merkle-Damgård design and is very similar to SHA-2 but includes some additional strengthening features.
Gaoli Wang   +4 more
openaire   +2 more sources

Boomerang Attack

open access: closed, 2011
Alex Biryukov
openalex   +2 more sources

New Boomerang Attacks on ARIA

2010
ARIA [5] is a block cipher proposed at ICISC’03. Its design is very similar to the Advanced Encryption Standard (AES). The authors propose that on 32-bit processors, the encryption speed is at least 70% of that of the AES. It is claimed to offer a higher security level than AES.
Stefan Lucks   +3 more
openaire   +1 more source

A related-key boomerang distinguishing attack of Threefish-256

Wuhan University Journal of Natural Sciences, 2012
The block cipher Threefish is the main component of Skein, which is based on ARX. Based on the efficient algorithms for calculating the differential of modular addition, we extend local collisions of Threefish-256 to more round by using related-key differential of addition in this paper.
Libin Wang, Zheng Gong, Shusheng Liu
openaire   +2 more sources

Boomerang Attacks on Hash Function Using Auxiliary Differentials [PDF]

open access: possible, 2012
In this paper we study boomerang attacks in the chosen-key setting. This is particularly relevant to hash function analysis, since many boomerang attacks have been described against ARX-based designs. We present a new way to combine message modifications, or auxiliary differentials, with the boomerang attack.
Gaëtan Leurent, Arnab Roy
openaire   +1 more source

New Related-Key Boomerang Attacks on AES

2008
In this paper we present two new attacks on round reduced versions of the AES. We present the first application of the related-key boomerang attack on 7 and 9 rounds of AES-192. The 7-round attack requires only 218 chosen plaintexts and ciphertexts and needs 267.5 encryptions. We extend our attack to nine rounds of AES-192.
Michael Gorski, Stefan Lucks
openaire   +2 more sources

Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis

IEEE Transactions on Information Theory, 2012
In 2004, we introduced the related-key boomerang/ rectangle attacks, which allow us to enjoy the benefits of the boomerang attack and the related-key technique, simultaneously. The new attacks were used since then to attack numerous block ciphers. While the claimed applications are significant, most of them have a major drawback.
Orr Dunkelman   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy