Sean Murphy (2009) The Return of the Boomerang.
Full text access: Open
The boomerang analysis, together with its offspring the amplified boomerang analysis and the rectangle analysis, are techniques that are widely used in the analysis of block ciphers. We give realistic examples which demonstrate that the boomerang analysis can commonly give probability values that are highly inaccurate. Thus any complexity estimates for the security of a block cipher based on the boomerang or rectangle analysis must be viewed extremely sceptically.
This is a Published version This version's date is: 16/10/2009 This item is peer reviewed
https://repository.royalholloway.ac.uk/items/df4faece-3cbf-158b-37d5-bfb284112c79/1/
Deposited by () on 24-Jun-2010 in Royal Holloway Research Online.Last modified on 15-Dec-2010
1. E. Biham, O. Dunkelman, and N. Keller. The Rectangle Attack – Rectangling theSerpent. In B. Pfitzmann, editor, Advances in Cryptology – EUROCRYPT 2001,volume 2045 of LNCS, pages 340–357. Springer–Verlag, 2001.
2. E. Biham and A. Shamir. Differential Cryptanalysis of the Data Encryption Standard.Springer–Verlag, 1993.
3. E. Biham and A. Shamir. Differential Cryptanalysis of the DES-like Cryptosystems.Journal of Cryptology, 4:3–72, 1993.
4. A. Biryukov and D. Khovratovich. Related-key Cryptanalysis of the Full AES-192 and AES-256, 2009. Available at http://eprint.iacr.org/2009/317 and toappear at ASIACRYPT 2009.
5. J. Daemen and V. Rijmen. The Design of Rijndael. Springer–Verlag, 2002.
6. Wen-Ai Jackson and S. Murphy. Projective Aspects of the AES Inversion. Designs,Codes and Cryptography, 43:167–179, 2007.
7. J. Kelsey, T. Kohno, and B. Schneier. Amplified Boomerang Attacks againstReduced-Round MARS and Serpent. In B. Schneier, editor, Fast Software Encryption,FSE 2000, volume 1978 of LNCS, pages 75–93. Springer–Verlag, 2001.
8. National Bureau of Standards. The Data Encryption Standard. Federal InformationProcessing Standards Publication (FIPS) 46, 1977.
9. National Institute of Standards and Technology. The Advanced Encryption Standard.Federal Information Processing Standards Publication (FIPS) 197, 2001.
10. S. Murphy and F. Piper and M.Walker and P.Wild. Maximum Likelihood Estimationfor Block Cipher Keys. Technical Report RHUL-MA-2006-3, Royal Holloway(University of London), 1994. http://www.ma.rhul.ac.uk/techreports.
11. D. Wagner. The Boomerang Attack. In L. Knudsen, editor, Fast Software Encryption,FSE ’99, volume 1636 of LNCS, pages 156–170. Springer–Verlag, 1999