- Boomerang attack
In
cryptography , the boomerang attack is a method for thecryptanalysis ofblock cipher s based ondifferential cryptanalysis . The attack was published in 1999 byDavid Wagner , who used it to break theCOCONUT98 cipher.The boomerang attack has allowed new avenues of attack for many ciphers previously deemed safe from differential cryptanalysis.
Refinements on the boomerang attack have been published: the amplified boomerang attack, then the rectangle attack.
The attack
The boomerang attack is based on
differential cryptanalysis . In differential cryptanalysis, an attacker exploits how differences in the input to a cipher (the plaintext) can affect the resultant difference at the output (the ciphertext). A high-probability "differential" (that is, an input difference that will produce a likely output difference) is needed that covers all, or nearly all, of the cipher. The boomerang attack allows differentials to be used which cover only part of the cipher.The attack attempts to generate a so-called "quartet" structure at a point halfway through the cipher. For this purpose, say that the encryption action, "E", of the cipher can be split into two consecutive stages, "E"0 and "E"1, so that "E(M)" = "E"1("E"0(M)), where "M" is some plaintext message. Suppose we have two differentials for the two stages; say,:for "E"0, and: for "E"1-1 (the decryption action of "E"1).
The basic attack proceeds as follows:
* Choose a random plaintext and calculate .
* Request the encryptions of and to obtain and
* Calculate and
* Request the decryptions of and to obtain and
* Compare and ; when the differentials hold, .Application to specific ciphers
The best attack on KASUMI, a block cipher used in
3GPP , is a related-key rectangle attack which breaks the full eight rounds of the cipher faster than exhaustive search (Biham et al., 2005). The attack requires 254.6 chosen plaintexts, each of which has been encrypted under one of four related keys, and has a time complexity equivalent to 276.1 KASUMI encryptions.References
* cite conference
author = David Wagner
title = The Boomerang Attack
booktitle = 6th International Workshop onFast Software Encryption (FSE '99)
pages = pp.156–170
publisher =Springer-Verlag
date = 1999-03
location =Rome
url = http://citeseer.ist.psu.edu/wagner99boomerang.html
format =PDF /PostScript
accessdate = 2007-02-05 [http://www.cs.berkeley.edu/~daw/papers/boomerang-fse99-slides.ps (Slides in PostScript)]
* cite conference
author = John Kelsey, Tadayoshi Kohno, andBruce Schneier
title = Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent
booktitle = FSE 2000
pages = pp.75–93
publisher = Springer-Verlag
date = 2000-04
location =New York City
url = http://www.schneier.com/paper-boomerang.html
format = PDF/PostScript
accessdate = 2007-02-06
* cite conference
author =Eli Biham ,Orr Dunkelman , and Nathan Keller
title = The Rectangle Attack – Rectangling the Serpent
booktitle = Advances in Cryptology, Proceedings ofEUROCRYPT 2001
pages = pp.340–357
publisher = Springer-Verlag
date = 2001-05
location =Innsbruck
url = http://citeseer.ist.psu.edu/biham01rectangle.html
format = PDF/PostScript
accessdate = 2007-07-06
* cite conference
author = Biham, Dunkelman, Keller
title = New Results on Boomerang and Rectangle Attacks
booktitle = FSE '02
pages = pp.1–16
publisher = Springer-Verlag
date = 2002-02
location =Leuven
url = http://citeseer.ist.psu.edu/504429.html
format = PDF/PostScript
accessdate = 2007-07-06
* cite conference
author = Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, Seokwon Jung
title = Amplified Boomerang Attack against Reduced-Round SHACAL
booktitle =ASIACRYPT 2002
pages = pp.243–253
publisher = Springer-Verlag
date = 2002-12
location =Queenstown, New Zealand
* cite conference
author = Biham, Dunkelman, Keller
title = Rectangle Attacks on 49-Round SHACAL-1
booktitle = FSE '03
pages = pp.22–35
publisher =Springer-Verlag
date = 2003-02
location =Lund
url = http://vipe.technion.ac.il/~orrd/crypt/shacal.pdf
format = PDF
accessdate = 2007-07-02
* cite conference
author =Alex Biryukov
title = The Boomerang Attack on 5 and 6-Round Reduced AES
booktitle =Advanced Encryption Standard — AES, 4th International Conference, AES 2004
pages = pp.11–15
publisher = Springer-Verlag
date = 2004-05
location =Bonn
url = http://www.cosic.esat.kuleuven.be/publications/article-206.pdf
format = PDF
accessdate = 2007-07-06
* cite conference
author = Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, Dowon Hong
title = The Related-Key Rectangle Attack — Application to SHACAL-1
booktitle = 9th Australasian Conference on Information Security and Privacy (ACISP 2004)
pages= pp.123–136
publisher = Springer-Verlag
date = 2004-07
location =Sydney
* cite conference
author = Seokhie Hong, Jongsung Kim, Sangjin Lee andBart Preneel
title = Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192
booktitle = FSE '05
pages = pp.368–383
publisher = Springer-Verlag
date = 2005-02
location =Paris
* cite conference
author = Biham, Dunkelman, Keller
title = Related-Key Boomerang and Rectangle Attacks
booktitle = EUROCRYPT 2005
pages = pp.507–525
publisher = Springer-Verlag
date = 2005-05
location =Aarhus
url = http://vipe.technion.ac.il/~orrd/crypt/relatedkey-rectangle.ps
format = PostScript
accessdate = 2007-02-16
* cite conference
author = Biham, Dunkelman, Keller
title = A Related-Key Rectangle Attack on the Full KASUMI
booktitle = ASIACRYPT 2005
pages = pp.443–461
publisher = Springer-Verlag
date = 2005-12
location =Chennai
url = http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-info.cgi/2005/CS/CS-2005-14
format = PDF/PostScript
accessdate = 2007-07-06External links
* [http://www.quadibloc.com/crypto/co4512.htm Boomerang attack] — explained by John Savard
* [http://www.ma.huji.ac.il/~nkeller Nathan Keller's homepage]
Wikimedia Foundation. 2010.