Boomerang connectivity table: a new cryptanalysis tool

C Cid, T Huang, T Peyrin, Y Sasaki, L Song - … , Tel Aviv, Israel, April 29-May …, 2018 - Springer
A boomerang attack is a cryptanalysis framework that regards a block cipher E as the
composition of two sub-ciphers E_1 ∘ E_0 E 1∘ E 0 and builds a particular characteristic for …

Boomerang connectivity table revisited. application to SKINNY and AES

L Hu, L Song, X Qin - 2019 - dr.ntu.edu.sg
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher
E as the composition of two sub-ciphers, ie, E= E1◦ E0, and which constructs distinguishers …

Differential cryptanalysis in the fixed-key model

T Beyne, V Rijmen - Annual International Cryptology Conference, 2022 - Springer
A systematic approach to the fixed-key analysis of differential probabilities is proposed. It is
based on the propagation of 'quasidifferential trails', which keep track of probabilistic linear …

On the feistel counterpart of the boomerang connectivity table

H Boukerrou, P Huynh, V Lallemand… - IACR Transactions on …, 2020 - inria.hal.science
At Eurocrypt 2018, Cid et al. introduced the Boomerang Connectivity Table (BCT), a tool to
compute the probability of the middle round of a boomerang distinguisher from the …

MILP-based differential cryptanalysis on round-reduced Midori64

H Zhao, G Han, L Wang, W Wang - IEEE Access, 2020 - ieeexplore.ieee.org
Mixed integer linear programming (MILP) model was presented by Sun et al. at Asiacrypt
2014 to search for differential characteristics of block ciphers. Based on this model, it is easy …

Key-recovery attacks on craft and warp (full version)

L Sun, W Wang, M Wang - Cryptology ePrint Archive, 2022 - eprint.iacr.org
This paper considers the security of CRAFT and WARP. We present a practical key-recovery
attack on full-round CRAFT in the related-key setting with only one differential characteristic …

Key-Recovery Attacks on CRAFT and WARP

L Sun, W Wang, M Wang - International Conference on Selected Areas in …, 2022 - Springer
This paper considers the security of CRAFT and WARP. We present a practical key-recovery
attack on full-round CRAFT in the related-key setting with only one differential characteristic …

A Linearisation Method for Identifying Dependencies in Differential Characteristics: Examining the Intersection of Deterministic Linear Relations and Nonlinear …

L Sun - Cryptology ePrint Archive, 2024 - eprint.iacr.org
The analytical perspective employed in the study classifies the theoretical research on
dependencies in differential characteristics into two types. By categorising all dependence …

Related-key boomerang attacks on full ANU lightweight block cipher

Y Sasaki - International Conference on Applied Cryptography and …, 2018 - Springer
This paper presents related-key attacks against lightweight block cipher ANU that requires
only 1015 gate equivalents for a 128-bit key, which is less than all existing lightweight …

The phantom of differential characteristics

Y Liu, W Zhang, B Sun, V Rijmen, G Liu, C Li… - Designs, Codes and …, 2020 - Springer
For differential cryptanalysis under the single-key model, the key schedules hardly need to
be exploited in constructing the characteristics, which is based on the hypothesis of …