TY - GEN
T1 - A practical related-key boomerang attack for the full MMB block cipher
AU - Ashur, Tomer
AU - Dunkelman, Orr
PY - 2013
Y1 - 2013
N2 - The MMB block cipher (Modular Multiplication-based Block cipher) is an iterative block cipher designed by Daemen, Govaerts, and Vandewalle in 1993 as an improvement of the PES and IPES ciphers. In this paper we present several new related-key differential characteristics of MMB. These characteristics can be used to form several related-key boomerangs to attack the full MMB. Using 2 20 adaptive chosen plaintexts and ciphertexts we recover all key bits in 235.2 time for the full MMB. Our attack was experimentally verified, and it takes less than 15 minutes on a standard Intel i5 machine to recover the full MMB key. After showing this practical attack on the full key of the full MMB, we present attacks on extended versions of MMB with up to 8 rounds (which is two more rounds than in the full MMB). We recover 64 out of the 128 key in time of 232.2 for 7-round MMB, and time of 232 for 8-round MMB using 220 plaintexts.
AB - The MMB block cipher (Modular Multiplication-based Block cipher) is an iterative block cipher designed by Daemen, Govaerts, and Vandewalle in 1993 as an improvement of the PES and IPES ciphers. In this paper we present several new related-key differential characteristics of MMB. These characteristics can be used to form several related-key boomerangs to attack the full MMB. Using 2 20 adaptive chosen plaintexts and ciphertexts we recover all key bits in 235.2 time for the full MMB. Our attack was experimentally verified, and it takes less than 15 minutes on a standard Intel i5 machine to recover the full MMB key. After showing this practical attack on the full key of the full MMB, we present attacks on extended versions of MMB with up to 8 rounds (which is two more rounds than in the full MMB). We recover 64 out of the 128 key in time of 232.2 for 7-round MMB, and time of 232 for 8-round MMB using 220 plaintexts.
KW - Differential cryptanalysis
KW - MMB
KW - Related-key boomerang attack
UR - http://www.scopus.com/inward/record.url?scp=84893681394&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-02937-5_15
DO - 10.1007/978-3-319-02937-5_15
M3 - Conference contribution
AN - SCOPUS:84893681394
SN - 9783319029368
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 271
EP - 290
BT - Cryptology and Network Security - 12th International Conference, CANS 2013, Proceedings
PB - Springer Verlag
T2 - 12th International Conference on Cryptology and Network Security, CANS 2013
Y2 - 20 November 2013 through 22 November 2013
ER -