New Results on Boomerang and Rectangle Attacks

Eli Biham, Orr Dunkelman, N. Keller

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

The boomerang attack is a new and very powerful cryptanalytic technique. However, due to the adaptive chosen plaintext and ciphertext nature of the attack, boomerang key recovery attacks that retrieve key material on both sides of the boomerang distinguisher are hard to mount. We also present a method for using a boomerang distinguisher, which enables retrieving subkey bits on both sides of the boomerang distinguisher. The rectangle attack evolved from the boomerang attack.In this paper we present a new algorithm which improves the results of the rectangle attack. Using these improvements we can attack 3.5-round SC2000 with 267 adaptive chosen plaintexts and ciphertexts, and 10-round Serpent with time complexity of 2173.8 memory accesses (which are equivalent to 2165.3 Serpent encryptions) with data complexity of 2126.3 chosen plaintexts.
Original languageAmerican English
Title of host publicationFast Software Encryption
EditorsJoan Daemen, Vincent Rijmen
Place of PublicationBerlin Heidelberg
PublisherSpringer
Pages1-16
Volume2365
StatePublished - 2002

Publication series

NameLecture Notes in Computer Science

Fingerprint

Dive into the research topics of 'New Results on Boomerang and Rectangle Attacks'. Together they form a unique fingerprint.

Cite this