TY - JOUR
T1 - The Retracing Boomerang Attack, with Application to Reduced-Round AES
AU - Dunkelman, Orr
AU - Keller, Nathan
AU - Ronen, Eyal
AU - Shamir, Adi
N1 - Publisher Copyright:
© The Author(s) 2024.
PY - 2024/7
Y1 - 2024/7
N2 - Boomerang attacks are extensions of differential attacks that make it possible to combine two unrelated differential properties of the first and second part of a cryptosystem with probabilities p and q into a new differential-like property of the whole cryptosystem with probability p2q2 (since each one of the properties has to be satisfied twice). In this paper, we describe a new version of boomerang attacks which uses the counterintuitive idea of throwing out most of the data in order to force equalities between certain values on the ciphertext side. In certain cases, this creates a correlation between the four probabilistic events, which increases the probability of the combined property to p2q and increases the signal-to-noise ratio of the resultant distinguisher. We call this variant a retracing boomerang attack since we make sure that the boomerang we throw follows the same path on its forward and backward directions. To demonstrate the power of the new technique, we apply it to the case of 5-round AES. This version of AES was repeatedly attacked by a large variety of techniques, but for twenty years its complexity had remained stuck at 232. At Crypto’18, it was finally reduced to 224 (for full key recovery), and with our new technique, we can further reduce the complexity of full key recovery to the surprisingly low value of 216.5 (i.e., only 90, 000 encryption/decryption operations are required for a full key recovery). In addition to improving previous attacks, our new technique unveils a hidden relationship between boomerang attacks and two other cryptanalytic techniques, the yoyo game and the recently introduced mixture differentials.
AB - Boomerang attacks are extensions of differential attacks that make it possible to combine two unrelated differential properties of the first and second part of a cryptosystem with probabilities p and q into a new differential-like property of the whole cryptosystem with probability p2q2 (since each one of the properties has to be satisfied twice). In this paper, we describe a new version of boomerang attacks which uses the counterintuitive idea of throwing out most of the data in order to force equalities between certain values on the ciphertext side. In certain cases, this creates a correlation between the four probabilistic events, which increases the probability of the combined property to p2q and increases the signal-to-noise ratio of the resultant distinguisher. We call this variant a retracing boomerang attack since we make sure that the boomerang we throw follows the same path on its forward and backward directions. To demonstrate the power of the new technique, we apply it to the case of 5-round AES. This version of AES was repeatedly attacked by a large variety of techniques, but for twenty years its complexity had remained stuck at 232. At Crypto’18, it was finally reduced to 224 (for full key recovery), and with our new technique, we can further reduce the complexity of full key recovery to the surprisingly low value of 216.5 (i.e., only 90, 000 encryption/decryption operations are required for a full key recovery). In addition to improving previous attacks, our new technique unveils a hidden relationship between boomerang attacks and two other cryptanalytic techniques, the yoyo game and the recently introduced mixture differentials.
KW - AES
KW - Boomerang attack
KW - Mixture differentials
KW - Rectangle attack
KW - Secret S-box
KW - Yoyo
UR - http://www.scopus.com/inward/record.url?scp=85198632459&partnerID=8YFLogxK
U2 - 10.1007/s00145-024-09512-7
DO - 10.1007/s00145-024-09512-7
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
AN - SCOPUS:85198632459
SN - 0933-2790
VL - 37
JO - Journal of Cryptology
JF - Journal of Cryptology
IS - 3
M1 - 32
ER -