YoVDO

The Retracing Boomerang Attack

Offered By: TheIACR via YouTube

Tags

Cryptography Courses Cybersecurity Courses Block Ciphers Courses AES Courses

Course Description

Overview

Explore a cryptographic attack technique presented at Eurocrypt 2020 in this 26-minute conference talk. Delve into the Retracing Boomerang Attack, a novel approach to cryptanalysis developed by Orr Dunkelman, Nathan Keller, Eyal Ronen, and Adi Shamir. Learn about block ciphers, differential attacks, and the boomerang attack before diving into the specifics of the retracing boomerang method. Discover variants such as the shifting and mixing retracing attacks, and examine their applications to AES, including the yo-yo distinguisher for 4-round AES and attacks on 5-round AES. Gain insights into cutting-edge cryptanalysis techniques and their potential impact on cipher security.

Syllabus

Intro
Short summary of the talk - II
Background I: Block ciphers
Background III: Differential attack I
Background VII: Boomerang attack III
Retracing boomerang attack IV
Shifting retracing attack II
Mixing retracing attack II
Variants of retracing boomerang
Yo-yo distinguisher for 4-round AES-IV
Yo-yo attack on 5-round AES [RBH17] - 1 • Basic idea: Add one round before the 4-round distinguisher
Yo-yo attack on 5-round AES - II
Improved attack on 5-round AES - IV


Taught by

TheIACR

Related Courses

Cryptography I
Stanford University via Coursera
Cyber Attack Countermeasures
New York University (NYU) via Coursera
Криптографические методы защиты информации
National Research Nuclear University MEPhI via edX
Symmetric Cryptography Essential Training
LinkedIn Learning
Foundations of Cryptography
NPTEL via Swayam