Boomerang attacks on BLAKE-32

  • Authors:
  • Alex Biryukov;Ivica Nikolić;Arnab Roy

  • Affiliations:
  • University of Luxembourg;University of Luxembourg;University of Luxembourg

  • Venue:
  • FSE'11 Proceedings of the 18th international conference on Fast software encryption
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present high probability differential trails on 2 and 3 rounds of BLAKE-32. Using the trails we are able to launch boomerang attacks on up to 8 round-reduced keyed permutation of BLAKE-32. Also, we show that boomerangs can be used as distinguishers for hash/ compression functions and present such distinguishers for the compression function of BLAKE-32 reduced to 7 rounds. Since our distinguishers on up to 6 round-reduced keyed permutation of BLAKE-32 are practical (complexity of only 212 encryptions), we are able to find boomerang quartets on a PC.