This paper describes a new differential-style attack, which we call the boomerang attack. This attack has several interesting ap-plications. First, we disprove the oft-repeated claim that eliminating all high-probability differentials for the whole cipher is sufficient to gu- arantee security against differential attacks. Second, we show how to break COCONUT98, a cipher designed using decorrelation techniques to ensure provable security against differential attacks, with an advanced differential-style attack that needs just 216 adaptively chosen texts. Also, to illustrate the power of boomerang techniques, we give new attacks on Khufu-16, FEAL-6, and 16 rounds of CAST-256.
CITATION STYLE
Wagner, D. (1999). The boomerang attack. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1636, pp. 156–170). Springer Verlag. https://doi.org/10.1007/3-540-48519-8_12
Mendeley helps you to discover research relevant for your work.