2010
DOI: 10.1007/s10623-010-9421-9
|View full text |Cite
|
Sign up to set email alerts
|

The (related-key) impossible boomerang attack and its application to the AES block cipher

Abstract: The Advanced Encryption Standard (AES) is a 128-bit block cipher with a user key of 128, 192 or 256 bits, released by NIST in 2001 as the next-generation data encryption standard for use in the USA. It was adopted as an ISO international standard in 2005. Impossible differential cryptanalysis and the boomerang attack are powerful variants of differential cryptanalysis for analysing the security of a block cipher. In this paper, building on the notions of impossible differential cryptanalysis and the boomerang … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
15
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(15 citation statements)
references
References 44 publications
(101 reference statements)
0
15
0
Order By: Relevance
“…Building upon the foundations of the impossible differential attack and the boomerang attack, we think it is an interesting idea to combine them together, with the name impossible boomerang attack. The impossible boomerang (IB) attack was firstly proposed by Lu in his doctoral thesis [Lu08] and subsequently published in [Lu11]. In [Lu08,Lu11], the author introduced the definition and extended its application to the related-key scenario.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Building upon the foundations of the impossible differential attack and the boomerang attack, we think it is an interesting idea to combine them together, with the name impossible boomerang attack. The impossible boomerang (IB) attack was firstly proposed by Lu in his doctoral thesis [Lu08] and subsequently published in [Lu11]. In [Lu08,Lu11], the author introduced the definition and extended its application to the related-key scenario.…”
Section: Introductionmentioning
confidence: 99%
“…The impossible boomerang (IB) attack was firstly proposed by Lu in his doctoral thesis [Lu08] and subsequently published in [Lu11]. In [Lu08,Lu11], the author introduced the definition and extended its application to the related-key scenario. With this new technique, Lu proposed several single-key attacks on 6-round AES-128 and 7-round AES-192/AES-256, and related-key attacks on 8-round AES-192 and 9-round AES-256.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The basic idea of boomerang cryptanalysis is to use short differential characteristics with relatively large probabilities to form long differential characteristics with high probability. Related-key impossible boomerang cryptanalysis [19] is obtained by using these three attacks in combination. Until now, many satisfying analysis results are obtained on AES and LBlock by using this cryptanalytic technique [19][20].…”
Section: Introductionmentioning
confidence: 99%
“…Related-key impossible boomerang cryptanalysis [19] is obtained by using these three attacks in combination. Until now, many satisfying analysis results are obtained on AES and LBlock by using this cryptanalytic technique [19][20].…”
Section: Introductionmentioning
confidence: 99%