The Return of the Boomerang

Sean Murphy

(2009)

Sean Murphy (2009) The Return of the Boomerang.

Our Full Text Deposits

Full text access: Open

Full Text - 203.34 KB

Links to Copies of this Item Held Elsewhere


Abstract

The boomerang analysis, together with its offspring the amplified boomerang analysis and the rectangle analysis, are techniques that are widely used in the analysis of block ciphers. We give realistic examples which demonstrate that the boomerang analysis can commonly give probability values that are highly inaccurate. Thus any complexity estimates for the security of a block cipher based on the boomerang or rectangle analysis must be viewed extremely sceptically.

Information about this Version

This is a Published version
This version's date is: 16/10/2009
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/df4faece-3cbf-158b-37d5-bfb284112c79/1/

Item TypeMonograph (Technical Report)
TitleThe Return of the Boomerang
AuthorsMurphy, Sean
DepartmentsFaculty of Science\Mathematics

Deposited by () on 24-Jun-2010 in Royal Holloway Research Online.Last modified on 15-Dec-2010

Notes

References

1. E. Biham, O. Dunkelman, and N. Keller. The Rectangle Attack – Rectangling the
Serpent. In B. Pfitzmann, editor, Advances in Cryptology – EUROCRYPT 2001,
volume 2045 of LNCS, pages 340–357. Springer–Verlag, 2001.

2. E. Biham and A. Shamir. Differential Cryptanalysis of the Data Encryption Standard.
Springer–Verlag, 1993.

3. E. Biham and A. Shamir. Differential Cryptanalysis of the DES-like Cryptosystems.
Journal of Cryptology, 4:3–72, 1993.

4. A. Biryukov and D. Khovratovich. Related-key Cryptanalysis of the Full AES-
192 and AES-256, 2009. Available at http://eprint.iacr.org/2009/317 and to
appear at ASIACRYPT 2009.

5. J. Daemen and V. Rijmen. The Design of Rijndael. Springer–Verlag, 2002.

6. Wen-Ai Jackson and S. Murphy. Projective Aspects of the AES Inversion. Designs,
Codes and Cryptography, 43:167–179, 2007.

7. J. Kelsey, T. Kohno, and B. Schneier. Amplified Boomerang Attacks against
Reduced-Round MARS and Serpent. In B. Schneier, editor, Fast Software Encryption,
FSE 2000, volume 1978 of LNCS, pages 75–93. Springer–Verlag, 2001.

8. National Bureau of Standards. The Data Encryption Standard. Federal Information
Processing Standards Publication (FIPS) 46, 1977.

9. National Institute of Standards and Technology. The Advanced Encryption Standard.
Federal Information Processing Standards Publication (FIPS) 197, 2001.

10. S. Murphy and F. Piper and M.Walker and P.Wild. Maximum Likelihood Estimation
for Block Cipher Keys. Technical Report RHUL-MA-2006-3, Royal Holloway
(University of London), 1994. http://www.ma.rhul.ac.uk/techreports.

11. D. Wagner. The Boomerang Attack. In L. Knudsen, editor, Fast Software Encryption,
FSE ’99, volume 1636 of LNCS, pages 156–170. Springer–Verlag, 1999


Details