In this paper we study boomerang attacks in the chosen-key setting. This is particularly relevant to hash function analysis, since many boomerang attacks have been described against ARX-based designs. We present a new way to combine message modifications, or auxiliary differentials, with the boomerang attack. We show that under some conditions, we can combine three independent paths instead of two for the classical boomerang attack. Our main result is obtained by applying this technique to round-reduced Skein-256, for which we show a distinguisher on the keyed permutation with complexity only 2 57, and a distinguisher on the compression function with complexity 2 114. We also discuss application of the technique to Skein-512 and show some problems with the paths used in previous boomerang analysis of Skein-512. © 2012 Springer-Verlag.
CITATION STYLE
Leurent, G., & Roy, A. (2012). Boomerang attacks on hash function using auxiliary differentials. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7178 LNCS, pp. 215–230). https://doi.org/10.1007/978-3-642-27954-6_14
Mendeley helps you to discover research relevant for your work.