This paper improves previous distinguishers and key recovery attacks against Deoxys-BC that is a core primitive of the authenticated encryption scheme Deoxys, which is one of the remaining candidates in CAESAR. We observe that previous attacks by Cid et al.published from ToSC 2017 have a lot of room to be improved. By carefully optimizing attack procedures, we reduce the complexities of 8- and 9-round related-tweakey boomerang distinguishers against Deoxys-BC-256 to 228 and 298respectively, whereas the previous attacks require 274 and 2124respectively. The distinguishers are then extended to 9-round and 10-round boomerang key-recovery attacks with a complexity 2112 and 2170respectively, while the previous rectangle attacks require 2118 and 2204respectively. The optimization techniques used in this paper are conceptually not new, yet we believe that it is important to know how much the attacks are optimized by considering the details of the design.
CITATION STYLE
Sasaki, Y. (2018). Improved related-tweakey boomerang attacks on deoxys-BC. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10831 LNCS, pp. 87–106). Springer Verlag. https://doi.org/10.1007/978-3-319-89339-6_6
Mendeley helps you to discover research relevant for your work.