2010
DOI: 10.1007/978-3-642-17401-8_13
|View full text |Cite
|
Sign up to set email alerts
|

New Boomerang Attacks on ARIA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…The capacity of the five-round differential-linear characteristic is 2 -45. 9 . The number of pairs required is about 2 99.4 .…”
Section: Differential-linear Attacks On Round-reduced Ariamentioning
confidence: 99%
See 2 more Smart Citations
“…The capacity of the five-round differential-linear characteristic is 2 -45. 9 . The number of pairs required is about 2 99.4 .…”
Section: Differential-linear Attacks On Round-reduced Ariamentioning
confidence: 99%
“…The design of ARIA is provably resistant against differential and linear attacks, but many other cryptanalysis methods have been developed to attack ARIA, such as integral attacks [7], [8], boomerang attacks [9], meet-in-the-middle attacks [10]- [12], impossible differential attacks [13]- [15], zero-correlation linear attacks [16], and biclique attacks [17]. Li and others [7] presented integral attacks based on six-round ARIA-128 and seven-round ARIA-256.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In [3], Wu et al first found some non-trivial 4-round impossible differentials which led to a 6-round attack on ARIA. The security of ARIA against boomerang attack was presented by Fleischmann et al [4]. Li et al first found some 3-round integral distinguishers by counting methods, which also led to a 6-round integral attack on ARIA-192 [5].…”
Section: Introductionmentioning
confidence: 99%
“…(4) For current 0, (1,11) , guess 0, (4,14) and partially encrypt plaintext pairs in (1) , and then select plaintext pairs whose difference (4,14) satisfies the equation (17). We store 2 +119 × 2 −8 = 2 +111 remaining ( (4,14) , SL 1, (4,14) ) and its SN in table (2) indexed by 0, (4,14) .…”
Section: The Procedures Of 7-round Attack Onmentioning
confidence: 99%