Improved related-key boomerang attacks on round-reduced Threefish-512

7Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Hash function Skein is one of the 14 NIST SHA-3 second round candidates. Threefish is a tweakable block cipher as the core of Skein defined with a 256-, 512- and 1024-bit block size. The 512-bit block size is the primary proposal of the authors. Skein had been updated after it entered the second round; the only difference between the original and the new version is the rotation constants. In this paper we construct related-key boomerang distinguishers on round-reduced Threefish-512 based on the new rotation constants using the method of modular differential. With these distinguishers we mount related-key boomerang key recovery attacks on Threefish-512 reduced to 32 33 and 34 rounds. The attack on 32-round Threefish-512 has time complexity 212 with memory of 2 195 bytes. The attacks on Threefish-512 reduced to 33 and 34 rounds have time complexity of 2324.6 and 2474.4 encryptions respectively and both with negligible memory. The best key recovery attack known before is proposed by Aumasson et al. Their attack which bases on the old rotation constants is also a related-key boomerang attack. For 32-round Threefish-512 their attack requires 2312 encryptions and 2 71bytes of memory. © Springer-Verlag Berlin Heidelberg 2010.

Cite

CITATION STYLE

APA

Chen, J., & Jia, K. (2010). Improved related-key boomerang attacks on round-reduced Threefish-512. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6047 LNCS, pp. 1–18). https://doi.org/10.1007/978-3-642-12827-1_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free