Abstract
We introduce a new cryptanalytic technique based on Wagner’s boomerang and inside-out attacks. We first describe this new attack in terms of the original boomerang attack, and then demonstrate its use on reduced-round variants of the MARS core and Serpent. Our attack breaks eleven rounds of the MARS core with 265chosen plaintexts, 270 memory, and 2229partial decryptions. Our attack breaks eight rounds of Serpent with 2114chosen plaintexts, 2119memory, and 2179partial decryptions.
Part of this work was done while working for Counterpane Internet Security, Inc.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
R. Anderson, E. Biham, and L. Knudsen, “Serpent: A Proposal for the Advanced Encryption Standard,” NIST AES Proposal, Jun1998.
C. Burwick, D. Coppersmith, E. D'Avignon, R. Gennaro, S. Halevi, C. Jutla, S.M. Matyas, L. O'Connor, M. Peyravian, D. Safford, and N. Zunic, “MARS-A Candidate Cipher for AES,” NIST AES Proposal, Jun1998.
E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.
L.R. Knudsen, “Truncated and Higher Order Differentials,” Fast Software Encryption, 2nd International Workshop Proceedings, Springer-Verlag, 1995, pp.196–211.
J. Kelsey and B. Schneier, “MARS Attacks! Cryptanalyzing Reduced-Round Variants of MARS,” Third AES Candidate Conference, to appear.
T. Kohno, J. Kelsey, and B. Schneier, “Preliminary Cryptanalysis of Reduced-Round Serpent,” Third AES Candidate Conference, to appear.
S. Langford and M. Hellman, “Differential-Linear Cryptanalysis,” Advances in Cryptology-CRYPTO’ 94, Springer-Verlag, 1994.
M. Matsui, “Linear Cryptanalysis Method for DES Cipher,” Advances in Cryptology-EUROCRYPT’ 93 Proceedings, Springer-Verlag, 1994, pp. 386–397.
National Institute of Standards and Technology, “Announcing Development of a Federal Information Standard for Advanced Encryption Standard,” Federal Register, v. 62,n. 1, 2 Jan 1997, pp. 93–94.
National Institute of Standards and Technology, “Announcing Request for Candidate Algorithm Nominations for the Advanced Encryption Standard (AES),” Federal Register, v. 62,n. 117, 12 Sep 1997, pp. 48051–48058.
B. Schneier and J. Kelsey, “Unbalanced Feistel Networks and Block Cipher Design,” Fast Software Encryption, 3rd International Workshop Proceedings, Springer-Verlag, 1996, pp. 121–144.
D. Wagner, “The Boomerang Attack,” Fast Software Encryption, 6th International Workshop, Springer-Verlag, 1999, pp. 156–170.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kelsey, J., Kohno, T., Schneier, B. (2001). Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent. In: Goos, G., Hartmanis, J., van Leeuwen, J., Schneier, B. (eds) Fast Software Encryption. FSE 2000. Lecture Notes in Computer Science, vol 1978. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44706-7_6
Download citation
DOI: https://doi.org/10.1007/3-540-44706-7_6
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41728-6
Online ISBN: 978-3-540-44706-1
eBook Packages: Springer Book Archive