Results 21 to 30 of about 10,636 (192)

The Retracing Boomerang Attack, with Application to Reduced-Round AES [PDF]

open access: hybridJournal of Cryptology
AbstractBoomerang attacks are extensions of differential attacks that make it possible to combine two unrelated differential properties of the first and second part of a cryptosystem with probabilities p and q into a new differential-like property of the whole cryptosystem with probability $$p^2q^2$$
Orr Dunkelman   +3 more
openalex   +3 more sources

The Boomerang Attacks on BLAKE and BLAKE2 [PDF]

open access: closed, 2015
In this paper, we study the security margins of hash functions BLAKE and BLAKE2 against the boomerang attack. We launch boomerang attacks on all four members of BLAKE and BLAKE2, and compare their complexities. We propose 8.5-round boomerang attacks on both BLAKE-512 and BLAKE2b with complexities \(2^{464}\) and \(2^{474}\) respectively.
Yonglin Hao
openalex   +2 more sources

Rectangle and Boomerang Attacks on DES [PDF]

open access: bronzeJournal of Software, 2008
Lei Zhang, Wenling Wu
openalex   +3 more sources

Related-Key Boomerang Attack on Block Cipher SQUARE [PDF]

open access: closedIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011
Square is an 8-round SPN structure block cipher and its round function and key schedule have been slightly modified to design building blocks of Rijndael. Key schedule of Square is simple and efficient but fully affine, so we apply a related-key attack on it.
Bonwook Koo, Yongjin Yeom, Junghwan Song
openalex   +2 more sources

A Formal Analysis of Boomerang Probabilities

open access: yesIACR Transactions on Symmetric Cryptology, 2022
In the past 20 years since their conception, boomerang attacks have become an important tool in the cryptanalysis of block ciphers. In the classical estimate of their success probability, assumptions are made about the independence of the underlying ...
Andreas B. Kidmose, Tyge Tiessen
doaj   +1 more source

Throwing Boomerangs into Feistel Structures

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Automatic tools to search for boomerang distinguishers have seen significant advances over the past few years. However, most previous work has focused on ciphers based on a Substitution Permutation Network (SPN), while analyzing the Feistel structure is
Hosein Hadipour   +2 more
doaj   +1 more source

Improved Rectangle Attacks on SKINNY and CRAFT

open access: yesIACR Transactions on Symmetric Cryptology, 2021
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard the target cipher E as a composition of two sub-ciphers, i.e., E = E1 ∘ E0, to construct a distinguisher for E with probability p2q2 by concatenating two short ...
Hosein Hadipour   +2 more
doaj   +1 more source

Operation Pillar of Defence and the 2013 Israeli elections: defensive or provocative intervention? [PDF]

open access: yes, 2014
Based on the research on the psychological and political effects of terrorism, this paper focuses on the possible use of provocative counter-terrorism operations in order to influence the outcome of elections.
Orenes, Philippse
core   +4 more sources

Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to WARP

open access: yesIACR Transactions on Symmetric Cryptology, 2022
In this paper we present a boomerang analysis of WARP, a recently proposed Generalized Feistel Network with extremely compact hardware implementations.
Virginie Lallemand   +2 more
doaj   +1 more source

Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys

open access: yesIACR Transactions on Symmetric Cryptology, 2019
The boomerang attack is a cryptanalysis technique that allows an attacker to concatenate two short differential characteristics. Several research results (ladder switch, S-box switch, sandwich attack, Boomerang Connectivity Table (BCT), ...) showed that ...
Haoyang Wang, Thomas Peyrin
doaj   +1 more source

Home - About - Disclaimer - Privacy