Volume- 3
Issue- 2
Year- 2015
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Suriyani Ariffin , Shahrizal Arshad
Boomerang analysis is a type of differential attack that use two bits of key difference and comparing both to examine any differences in bit after encryption. This paper describe boomerang analysis of permutation function of three-dimensional Advanced Encryption Standard or 3D-AES. The objective of this paper is to analyze 3D-AES security using boomerang cryptanalysis. The new block cipher algorithm not been tested by boomerang analysis before. From boomerang cryptanalysis on 3D-AES block cipher, from the experiment and significance results, it can be concluded 3D-AES block cipher is secure using boomerang analysis
[1] De Canniere, C., Biryukov, A., & Preneel, B. (2006). An introduction to block cipher cryptanalysis. Proceedings of the IEEE, 94(2), 346-356.
[2] William, S. (2008). Network security essentials. Pearson Education India.
[3] Feistel, H. (1973). Cryptography and computer privacy. Scientific american, 228, 15-23.
[4] Shannon, C. E. (1949). Communication Theory of Secrecy Systems*. Bell system technical journal, 28(4), 656-715.
[5] Wagner, D. (1999, January). The boomerang attack. In Fast Software Encryption (pp. 156-170). Springer Berlin Heidelberg.
[6] Biham, E., Dunkelman, O., & Keller, N. (2005). Related-key boomerang and rectangle attacks. In Advances in Cryptology–EUROCRYPT 2005 (pp. 507-525). Springer Berlin Heidelberg.
[7] Choy, J., Zhang, A., Khoo, K., Henricksen, M., & Poschmann, A. (2011). AES variants secure against related-key differential and boomerang attacks. In Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication (pp. 191-207). Springer Berlin Heidelberg.
[8] Soleimany, H., Sharifi, A., & Aref, M. (2010, April). Improved Related-Key Boomerang Cryptanalysis of AES-256. In Information Science and Applications (ICISA), 2010 International Conference on (pp. 1-7). IEEE.
[9] Biryukov, A., Khovratovich, D., & Nikolić, I. (2009). Distinguisher and related-key attack on the full AES-256. In Advances in Cryptology-CRYPTO 2009 (pp. 231-249). Springer Berlin Heidelberg.
[10] Biryukov, A., & Khovratovich, D. (2009). Related-key cryptanalysis of the full AES-192 and AES-256. In Advances in Cryptology–ASIACRYPT 2009 (pp. 1-18). Springer Berlin Heidelberg.
[11] Joux, A., & Peyrin, T. (2007). Hash functions and the (amplified) boomerang attack. In Advances in Cryptology-CRYPTO 2007 (pp. 244-263). Springer Berlin Heidelberg.
[12] Kelsey, J., Kohno, T., & Schneier, B. (2001, January). Amplified boomerang attacks against reduced-round MARS and Serpent. In Fast Software Encryption (pp. 75-93). Springer Berlin Heidelberg.
[13] Kim, J., Moon, D., Lee, W., Hong, S., Lee, S., & Jung, S. (2002). Amplified boomerang attack against reduced-round SHACAL. In Advances in Cryptology—ASIACRYPT 2002 (pp. 243-253). Springer Berlin Heidelberg.
[14] Ariffin, S. (2012, October). Secure Block Cipher Inspired by The Human Immune System. School of Graduate Studies, Universiti Putra Malaysia.
[15] Ariffin, S., Mahmod, R., Jaafar, A., & Ariffin, M. R. K. (2012). Symmetric Encryption Algorithm Inspired by Randomness and Non-Linearity of Immune Systems. International Journal of Natural Computing Research (IJNCR), 3(1), 56-72.
[16] Ariffin, S., Mahmod, R., Jaafar, A., Rezal, M., & Ariffin, K. (2012). An Immune System-Inspired Byte Permutation Function to Improve Confusion Performance of Round Transformation in Symmetric Encryption Scheme. In Computer Science and its Applications (pp. 339-351). Springer Netherlands.
[17] Daemen, J. & Rijmen, V. (2002). AES and the Wide Trail Design Strategy. In: Knudlen, L. (ed.) Advanced in Cryptology EUROCRYPT 2002. Lecture Notes in Computer Science, vol. 2332 (pp. 108-109). Springer Berlin Heidelberg.
Senior Lecturer at Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA
No. of Downloads: 4 | No. of Views: 941