Results 11 to 20 of about 10,636 (192)

Truncated Boomerang Attacks and Application to AES-Based Ciphers [PDF]

open access: bronze, 2023
The boomerang attack is a cryptanalysis technique that combines two short differentials instead of using a single long differential. It has been applied to many primitives, and results in the best known attacks against several AES-based ciphers (Kiasu-BC, Deoxys-BC).
Augustin Bariant, Gaëtan Leurent
openalex   +2 more sources

Quantum Boomerang Attacks and Some Applications

open access: green, 2022
In this paper, we study quantum key-recovery attacks on block ciphers. While it is well known that a quantum adversary can generically speed up an exhaustive search of the key, much less is known on how to use specific vulnerabilities of the cipher to accelerate this procedure.
Paul Frixons   +2 more
openalex   +4 more sources

A Holistic Framework for Impossible Boomerang Attacks [PDF]

open access: hybridIACR Communications in Cryptology
In 2011, Lu introduced the impossible boomerang attack at DCC. This powerful cryptanalysis technique combines the strengths of the impossible differential and boomerang attacks, thereby inheriting the advantages of both cryptographic techniques. In this paper, we propose a holistic framework comprising two generic and effective algorithms and a MILP ...
Yincen Chen   +5 more
openalex   +2 more sources

Related-Key Boomerang and Rectangle Attacks [PDF]

open access: bronze, 2005
The boomerang attack and the rectangle attack are two attacks that utilize differential cryptanalysis in a larger construction. Both attacks treat the cipher as a cascade of two sub-ciphers, where there exists a good differential for each sub-cipher, but not for the entire cipher.
Eli Biham, Orr Dunkelman, Nathan Keller
openalex   +2 more sources

Boomerang packet testing to mitigate wormhole attack in MANET [PDF]

open access: green, 2023
Abstract MANET is an infrastructure-less wireless technology used in various critical infrastructure areas such as the military environment, disaster management, etc. MANET is also subject to various security breaches. One such attack is the wormhole attack.
K Rajkumar, S mercy Shalinie
openalex   +2 more sources

The Boomerang Attack [PDF]

open access: closed, 1999
This paper describes a new differential-style attack, which we call the boomerang attack. This attack has several interesting applications. First, we disprove the of t-repeated claim that eliminating all high-probability differentials for the whole cipher is sufficient to guarantee security against differential attacks.
David Wagner
openalex   +2 more sources

The Boomerang Attack on 5 and 6-round Reduced AES [PDF]

open access: green, 2005
In this note we study security of 128-bit key 10-round AES against the boomerang attack. We show attacks on AES reduced to 5 and 6 rounds, much faster than the exhaustive key search and twice faster than the “Square” attack of the AES designers. The attacks are structural and apply to other SPN ciphers with incomplete diffusion.
Alex Biryukov
openalex   +3 more sources

Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent [PDF]

open access: bronze, 2001
We introduce a new cryptanalytic technique based on Wagner's boomerang and inside-out attacks. We first describe this new attack in terms of the original boomerang attack, and then demonstrate its use on reduced-round variants of the MARS core and Serpent. Our attack breaks eleven rounds of the MARS core with 265 chosen plaintexts, 270 memory, and 2229
John Kelsey   +2 more
openalex   +3 more sources

Amplified Boomerang Attack against Reduced-Round SHACAL [PDF]

open access: bronze, 2002
SHACAL is a 160-bit block cipher based on the hash standard SHA-1, as a submission to NESSIE. SHACAL uses the XOR, modular addition operation and the functions of bit-by-bit manner. These operations and functions make the differential cryptanalysis difficult, i.e, it is hard to find a long differential characteristic with high probability.
Jongsung Kim   +5 more
openalex   +2 more sources

AES Variants Secure against Related-Key Differential and Boomerang Attacks [PDF]

open access: bronze, 2011
In this paper, we present a framework for protection against the recent related-key differential and boomerang attacks on AES by Biryukov et al. Then we study an alternative AES key schedule proposed by May et al. at ACISP 2002 as a possible candidate to protect against these related key attacks.
Jiali Choy   +4 more
  +5 more sources

Home - About - Disclaimer - Privacy