Results 1 to 10 of about 17 (13)

On Impossible Boomerang Attacks

open access: yesIACR Transactions on Symmetric Cryptology
The impossible boomerang attack, introduced in 2008 by Jiqiang Lu, is an extension of the impossible differential attack that relies on a boomerang distinguisher of probability 0 for discarding incorrect key guesses.
Xavier Bonnetain   +4 more
doaj   +5 more sources

Optimizing key recovery in impossible cryptanalysis and its automated tool [PDF]

open access: yesDesigns, Codes and Cryptography
Impossible differential (ID) cryptanalysis and impossible boomerang (IB) cryptanalysis are two methods of impossible cryptanalysis against block ciphers. Since the seminal work introduced by Boura et al.
Haoyang Wang, Jianing Zhang
semanticscholar   +3 more sources

Secret Can Be Public: Low-Memory AEAD Mode for High-Order Masking [PDF]

open access: yes, 2022
We propose a new AEAD mode of operation for an efficient countermeasure against side-channel attacks. Our mode achieves the smallest memory with high-order masking, by minimizing the states that are duplicated in masking.
Takeshi Sugawara   +2 more
core  

Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks [PDF]

open access: yes, 2023
Impossible differential (ID), zero-correlation (ZC), and integral attacks are a family of important attacks on block ciphers. For example, the impossible differential attack was the first cryptanalytic attack on 7 rounds of AES.
Hosein Hadipour   +2 more
core  

Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256 [PDF]

open access: yes, 2022
Designing symmetric ciphers for particular applications becomes a hot topic. At EUROCRYPT 2020, Naito, Sasaki and Sugawara invented the threshold implementation friendly cipher SKINNYe-64-256 to meet the requirement of the authenticated encryption ...
Anyu Wang   +4 more
core  

Improved Search for Integral, Impossible-Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2 [PDF]

open access: yes, 2023
Integral, impossible-differential (ID), and zero-correlation (ZC) attacks are three of the most important attacks on block ciphers. However, manually finding these attacks can be a daunting task, which is why automated methods are becoming increasingly ...
Hosein Hadipour   +3 more
core  

A Note on the use of the Double Boomerang Connectivity Table (DBCT) for Spotting Impossibilities [PDF]

open access: yes
In this short note we examine one of the impossible boomerang distinguishers of Skinny-128-384 provided by Zhang, Wang and Tang at ToSC 2024 Issue 2 and disprove it.
Virginie Lallemand, Xavier Bonnetain
core  

Pre-sieve, Partial-guess, and Accurate estimation: Full-round Related-key Impossible Boomerang Attack on ARADI [PDF]

open access: yes
The impossible boomerang attack is a very powerful attack, and the existing results show that it is more effective than the impossible differential attack in the related-key scenario.
Lin Jiao, Xichao Hu
core  

A Holistic Framework for Impossible Boomerang Attacks [PDF]

open access: yes
In 2011, Lu introduced the impossible boomerang attack at DCC. This powerful cryptanalysis technique combines the strengths of the impossible differential and boomerang attacks, thereby inheriting the advantages of both cryptographic techniques.
Jiahao Zhao   +5 more
core  

Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY [PDF]

open access: yes
The impossible boomerang (IB) attack was first introduced by Lu in his doctoral thesis and subsequently published at DCC in 2011. The IB attack is a variant of the impossible differential (ID) attack by incorporating the idea of the boomerang attack.
Deng Tang, Haoyang Wang, Jianing Zhang
core  

Home - About - Disclaimer - Privacy