Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Jongsung | - |
dc.contributor.author | Hong, Seokhie | - |
dc.contributor.author | Preneel, Bart | - |
dc.contributor.author | Biham, Eli | - |
dc.contributor.author | Dunkelman, Orr | - |
dc.contributor.author | Keller, Nathan | - |
dc.date.accessioned | 2021-09-06T18:09:42Z | - |
dc.date.available | 2021-09-06T18:09:42Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2012-07 | - |
dc.identifier.issn | 0018-9448 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/108055 | - |
dc.description.abstract | In 2004, we introduced the related-key boomerang/rectangle attacks, which allow us to enjoy the benefits of the boomerang attack and the related-key technique, simultaneously. The new attacks were used since then to attack numerous block ciphers. While the claimed applications are significant, most of them have a major drawback. Their validity cannot be verified experimentally due to their high complexity. Together with the lack of rigorous justification of the probabilistic assumptions underlying the technique, this lead Murphy to claim that attacks using the related-key boomerang/rectangle technique are not legitimate. This paper contains two contributions. The first is a rigorous analysis of the related-key boomerang/rectangle attacks, including devising provably optimal distinguishers and computing their success rate, and discussing the underlying independence assumptions. The second contribution is an extensive experimental verification of the related-key boomerang attack against the GSM block cipher, KASUMI. Our experiments reveal that the success probability of the distinguisher, when averaged over different choices of the keys, is close to the theoretical prediction. However, the exact probability depends on the key, such that for some portion of the keys, the distinguisher holds with a higher probability than expected, while for the rest of the keys, the distinguisher fails completely. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.subject | CRYPTANALYSIS | - |
dc.subject | AES-192 | - |
dc.title | Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hong, Seokhie | - |
dc.identifier.doi | 10.1109/TIT.2012.2191655 | - |
dc.identifier.wosid | 000305575000057 | - |
dc.identifier.bibliographicCitation | IEEE TRANSACTIONS ON INFORMATION THEORY, v.58, no.7, pp.4948 - 4966 | - |
dc.relation.isPartOf | IEEE TRANSACTIONS ON INFORMATION THEORY | - |
dc.citation.title | IEEE TRANSACTIONS ON INFORMATION THEORY | - |
dc.citation.volume | 58 | - |
dc.citation.number | 7 | - |
dc.citation.startPage | 4948 | - |
dc.citation.endPage | 4966 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordPlus | CRYPTANALYSIS | - |
dc.subject.keywordPlus | AES-192 | - |
dc.subject.keywordAuthor | Experimental analysis | - |
dc.subject.keywordAuthor | KASUMI | - |
dc.subject.keywordAuthor | related-key boomerang attack | - |
dc.subject.keywordAuthor | related-key rectangle attack | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.