Improved related-tweakey boomerang attacks on deoxys-BC

11Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper improves previous distinguishers and key recovery attacks against Deoxys-BC that is a core primitive of the authenticated encryption scheme Deoxys, which is one of the remaining candidates in CAESAR. We observe that previous attacks by Cid et al.published from ToSC 2017 have a lot of room to be improved. By carefully optimizing attack procedures, we reduce the complexities of 8- and 9-round related-tweakey boomerang distinguishers against Deoxys-BC-256 to 228 and 298respectively, whereas the previous attacks require 274 and 2124respectively. The distinguishers are then extended to 9-round and 10-round boomerang key-recovery attacks with a complexity 2112 and 2170respectively, while the previous rectangle attacks require 2118 and 2204respectively. The optimization techniques used in this paper are conceptually not new, yet we believe that it is important to know how much the attacks are optimized by considering the details of the design.

Cite

CITATION STYLE

APA

Sasaki, Y. (2018). Improved related-tweakey boomerang attacks on deoxys-BC. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10831 LNCS, pp. 87–106). Springer Verlag. https://doi.org/10.1007/978-3-319-89339-6_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free