The Retracing Boomerang Attack, with Application to Reduced-Round AES

Author:

Dunkelman Orr,Keller Nathan,Ronen Eyal,Shamir Adi

Abstract

AbstractBoomerang attacks are extensions of differential attacks that make it possible to combine two unrelated differential properties of the first and second part of a cryptosystem with probabilities p and q into a new differential-like property of the whole cryptosystem with probability $$p^2q^2$$ p 2 q 2 (since each one of the properties has to be satisfied twice). In this paper, we describe a new version of boomerang attacks which uses the counterintuitive idea of throwing out most of the data in order to force equalities between certain values on the ciphertext side. In certain cases, this creates a correlation between the four probabilistic events, which increases the probability of the combined property to $$p^2q$$ p 2 q and increases the signal-to-noise ratio of the resultant distinguisher. We call this variant a retracing boomerang attack since we make sure that the boomerang we throw follows the same path on its forward and backward directions. To demonstrate the power of the new technique, we apply it to the case of 5-round AES. This version of AES was repeatedly attacked by a large variety of techniques, but for twenty years its complexity had remained stuck at $$2^{32}$$ 2 32 . At Crypto’18, it was finally reduced to $$2^{24}$$ 2 24 (for full key recovery), and with our new technique, we can further reduce the complexity of full key recovery to the surprisingly low value of $$2^{16.5}$$ 2 16.5 (i.e., only 90, 000 encryption/decryption operations are required for a full key recovery). In addition to improving previous attacks, our new technique unveils a hidden relationship between boomerang attacks and two other cryptanalytic techniques, the yoyo game and the recently introduced mixture differentials.

Funder

University of Haifa

Publisher

Springer Science and Business Media LLC

Reference51 articles.

1. X. An, H. Kai, W. Meiqin. Mixcolumns coefficient property and security of the AES with a secret s-box, in Proceedings of AFRICACRYPT 2020, volume 12174 of LNCS (Springer, 2020), pp. 114–131

2. V. Arlazarov, E. Dinic, A. M. Kronrod, I. Faradžev, On economical construction of the transitive closure of a directed graph. Dokl. Akad. Nauk SSSR, 194(11):1201–1290, (1970)

3. Achiya Bar-On, Eli Biham, Orr Dunkelman, Nathan Keller, Efficient slide attacks. J. Cryptology, 31(3):641–670, (2018)

4. A. Bar-On, O. Dunkelman, N. Keller, E. Ronen, A. Shamir, Improved key recovery attacks on reduced-round AES with practical data and memory complexities, in Advances in Cryptology—CRYPTO 2018. LNCS of vol. 10992 (2018), pp. 185–212

5. G.V. Bard, Achieving a log(n) speed up for Boolean matrix operations and calculating the complexity of the dense linear algebra step of algebraic stream cipher attacks and of integer factorization methods. IACR Cryptol. ePrint Archive, 2006, 163 (2006)

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3