A practical related-key boomerang attack for the full MMB block cipher

Tomer Ashur, Orr Dunkelman

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The MMB block cipher (Modular Multiplication-based Block cipher) is an iterative block cipher designed by Daemen, Govaerts, and Vandewalle in 1993 as an improvement of the PES and IPES ciphers. In this paper we present several new related-key differential characteristics of MMB. These characteristics can be used to form several related-key boomerangs to attack the full MMB. Using 2 20 adaptive chosen plaintexts and ciphertexts we recover all key bits in 235.2 time for the full MMB. Our attack was experimentally verified, and it takes less than 15 minutes on a standard Intel i5 machine to recover the full MMB key. After showing this practical attack on the full key of the full MMB, we present attacks on extended versions of MMB with up to 8 rounds (which is two more rounds than in the full MMB). We recover 64 out of the 128 key in time of 232.2 for 7-round MMB, and time of 232 for 8-round MMB using 220 plaintexts.

Original languageEnglish
Title of host publicationCryptology and Network Security - 12th International Conference, CANS 2013, Proceedings
PublisherSpringer Verlag
Pages271-290
Number of pages20
ISBN (Print)9783319029368
DOIs
StatePublished - 2013
Event12th International Conference on Cryptology and Network Security, CANS 2013 - Paraty, Brazil
Duration: 20 Nov 201322 Nov 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8257 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference12th International Conference on Cryptology and Network Security, CANS 2013
Country/TerritoryBrazil
CityParaty
Period20/11/1322/11/13

Keywords

  • Differential cryptanalysis
  • MMB
  • Related-key boomerang attack

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'A practical related-key boomerang attack for the full MMB block cipher'. Together they form a unique fingerprint.

Cite this