Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery

IF 2.3 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Journal of Cryptology Pub Date : 2024-04-10 DOI:10.1007/s00145-024-09499-1
Qianqian Yang, Ling Song, Nana Zhang, Danping Shi, Libo Wang, Jiahao Zhao, Lei Hu, Jian Weng
{"title":"Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery","authors":"Qianqian Yang, Ling Song, Nana Zhang, Danping Shi, Libo Wang, Jiahao Zhao, Lei Hu, Jian Weng","doi":"10.1007/s00145-024-09499-1","DOIUrl":null,"url":null,"abstract":"<p>The rectangle attack has shown to be a very powerful form of cryptanalysis against block ciphers. Given a rectangle distinguisher, one expects to mount key recovery attacks as efficiently as possible. In the literature, there have been four algorithms for rectangle key recovery attacks. However, their performance varies from case to case. Besides, numerous are the applications where the attacks lack optimality. In this paper, we delve into the rectangle key recovery and propose a unified and generic key recovery algorithm, which supports any possible attacking parameters. Not only does it encompass the four existing rectangle key recovery algorithms, but it also reveals five new types of attacks that were previously overlooked. Further, we put forward a counterpart for boomerang key recovery attacks, which supports any possible attacking parameters as well. Along with these new key recovery algorithms, we propose a framework to automatically determine the best parameters for the attack. To demonstrate the efficiency of the new key recovery algorithms, we apply them to <span>Serpent</span>, <span>AES</span>-192, <span>CRAFT</span>, <span>SKINNY</span>, and <span>Deoxys-BC</span>-256 based on existing distinguishers, yielding a series of improved attacks.</p>","PeriodicalId":54849,"journal":{"name":"Journal of Cryptology","volume":"55 1","pages":""},"PeriodicalIF":2.3000,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Cryptology","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s00145-024-09499-1","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

Abstract

The rectangle attack has shown to be a very powerful form of cryptanalysis against block ciphers. Given a rectangle distinguisher, one expects to mount key recovery attacks as efficiently as possible. In the literature, there have been four algorithms for rectangle key recovery attacks. However, their performance varies from case to case. Besides, numerous are the applications where the attacks lack optimality. In this paper, we delve into the rectangle key recovery and propose a unified and generic key recovery algorithm, which supports any possible attacking parameters. Not only does it encompass the four existing rectangle key recovery algorithms, but it also reveals five new types of attacks that were previously overlooked. Further, we put forward a counterpart for boomerang key recovery attacks, which supports any possible attacking parameters as well. Along with these new key recovery algorithms, we propose a framework to automatically determine the best parameters for the attack. To demonstrate the efficiency of the new key recovery algorithms, we apply them to Serpent, AES-192, CRAFT, SKINNY, and Deoxys-BC-256 based on existing distinguishers, yielding a series of improved attacks.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
优化矩形和回旋镖攻击:密钥恢复的统一通用框架
矩形攻击已被证明是针对块密码的一种非常强大的密码分析形式。给定一个矩形区分器,我们就可以尽可能有效地发起密钥恢复攻击。文献中已有四种矩形密钥恢复攻击算法。然而,它们的性能因情况而异。此外,在许多应用中,这些攻击缺乏最优性。在本文中,我们深入研究了矩形密钥恢复,并提出了一种统一的通用密钥恢复算法,它支持任何可能的攻击参数。它不仅涵盖了现有的四种矩形密钥恢复算法,还揭示了五种以前被忽视的新型攻击。此外,我们还提出了回旋镖密钥恢复攻击的对应算法,它也支持任何可能的攻击参数。除了这些新的密钥恢复算法,我们还提出了一个自动确定最佳攻击参数的框架。为了证明新密钥恢复算法的效率,我们将其应用于基于现有区分器的 Serpent、AES-192、CRAFT、SKINNY 和 Deoxys-BC-256,从而获得了一系列改进的攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
相关文献
Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery
IF 0 IACR Cryptology ePrint ArchivePub Date : 1900-01-01 DOI: 10.1007/978-3-031-22963-3_14
Ling Song, N. Zhang, Qianqian Yang, Danping Shi, Jiahao Zhao, Lei Hu, Jian Weng
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version)
IF 0 IACR Cryptology ePrint ArchivePub Date : 2009-04-16 DOI: 10.1007/978-3-642-01001-9_26
François-Xavier Standaert, T. Malkin, M. Yung
A Unified and Fully Automated Framework for Wavelet-Based Attacks on Random Delay
IF 3.6 2区 计算机科学IEEE Transactions on ComputersPub Date : 2024-06-19 DOI: 10.1109/TC.2024.3416682
Qianmei Wu;Fan Zhang;Shize Guo;Kun Yang;Haoting Shen
来源期刊
Journal of Cryptology
Journal of Cryptology 工程技术-工程:电子与电气
CiteScore
7.10
自引率
3.30%
发文量
24
审稿时长
18 months
期刊介绍: The Journal of Cryptology is a forum for original results in all areas of modern information security. Both cryptography and cryptanalysis are covered, including information theoretic and complexity theoretic perspectives as well as implementation, application, and standards issues. Coverage includes such topics as public key and conventional algorithms and their implementations, cryptanalytic attacks, pseudo-random sequences, computational number theory, cryptographic protocols, untraceability, privacy, authentication, key management and quantum cryptography. In addition to full-length technical, survey, and historical articles, the journal publishes short notes.
期刊最新文献
Randomness Recoverable Secret Sharing Schemes Memory-Efficient Attacks on Small LWE Keys Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of a Prevailing Assumption The Price of Active Security in Cryptographic Protocols
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1