## CryptoDB

### Paper: Related-Key Boomerang and Rectangle Attacks

Authors: Jongsung Kim Seokhie Hong Bart Preneel Eli Biham Orr Dunkelman Nathan Keller URL: http://eprint.iacr.org/2010/019 Search ePrint Search Google This paper introduces the related-key boomerang and the related-key rectangle attacks. These new attacks can expand the cryptanalytic toolbox, and can be applied to many block ciphers. The main advantage of these new attacks, is the ability to exploit the related-key model twice. Hence, even ciphers which were considered resistant to either boomerang or related-key differential attacks may be broken using the new techniques. In this paper we present a rigorous treatment of the related-key boomerang and the related-key rectangle distinguishers. Following this treatment, we devise optimal distinguishing algorithms using the LLR (Logarithmic Likelihood Ratio) statistics. We then analyze the success probability under reasonable independence assumptions, and verify the computation experimentally by implementing an actual attack on a 6-round variant of KASUMI. The paper ends with a demonstration of the strength of our new proposed techniques with attacks on 10-round AES-192 and the full KASUMI.
##### BibTeX
@misc{eprint-2010-22920,
title={Related-Key Boomerang and Rectangle Attacks},
booktitle={IACR Eprint archive},
keywords={secret-key cryptography / Related-key Boomerang Attack, Related-Key Rectangle Attack, AES, KASUMI.},
url={http://eprint.iacr.org/2010/019},
note={Submitted to a journal in October 2009 orr.dunkelman@weizmann.ac.il 14621 received 12 Jan 2010},
author={Jongsung Kim and Seokhie Hong and Bart Preneel and Eli Biham and Orr Dunkelman and Nathan Keller},
year=2010
}