The rectangle Attack - Rectangling the serpent

Eli Biham, Orr Dunkelman, Nathan Keller

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Serpent is one of the 5 AES finalists. The best attack published so far analyzes up to 9 rounds. In this paper we present attacks on 7-round, 8-round, and 10-round variants of Serpent. We attack a 7-round variant with all key lengths, and 8- and 10-round variants with 256-bit keys. The 10-round attack on the 256-bit keys variants is the best published attack on the cipher. The attack enhances the amplified boomerang attack and uses better differentials. We also present the best 3-round, 4-round, 5-round and 6-round differential characteristics of Serpent.

Original languageEnglish
Title of host publicationAdvances in Cryptology - EUROCRYPT 2001 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings
EditorsBirgit Pfitzmann
PublisherSpringer Verlag
Pages340-357
Number of pages18
ISBN (Print)3540420703
DOIs
StatePublished - 2001
Externally publishedYes
EventInternational Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 2001 - Innsbruck, Austria
Duration: 6 May 200110 May 2001

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2045
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 2001
Country/TerritoryAustria
CityInnsbruck
Period6/05/0110/05/01

Bibliographical note

Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 2001.

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'The rectangle Attack - Rectangling the serpent'. Together they form a unique fingerprint.

Cite this