Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities

J Ahn, R Hussain, K Kang, J Son - … Communications Surveys & …, 2025 - ieeexplore.ieee.org
Cryptographic network protocols play a crucial role in enabling secure data exchange over
insecure media in modern network environments. However, even minor vulnerabilities can …

Truncated boomerang attacks and application to AES-based ciphers

A Bariant, G Leurent - Annual International Conference on the Theory and …, 2023 - Springer
The boomerang attack is a cryptanalysis technique that combines two short differentials
instead of using a single long differential. It has been applied to many primitives, and results …

Key guessing strategies for linear key-schedule algorithms in rectangle attacks

X Dong, L Qin, S Sun, X Wang - … on the Theory and Applications of …, 2022 - Springer
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we
find the right quartets which may suggest key candidates have to satisfy some nonlinear …

Too much crypto

JP Aumasson - Cryptology EPrint Archive, 2019 - eprint.iacr.org
We show that many symmetric cryptography primitives would not be less safe with
significantly fewer rounds. To support this claim, we review the cryptanalysis progress in the …

Revisiting related-key boomerang attacks on AES using computer-aided tool

P Derbez, M Euler, PA Fouque, PH Nguyen - International Conference on …, 2022 - Springer
In recent years, several MILP models were introduced to search automatically for
boomerang distinguishers and boomerang attacks on block ciphers. However, they can only …

Orthros: a low-latency PRF

S Banik, T Isobe, F Liu, K Minematsu… - IACR Transactions on …, 2021 - tosc.iacr.org
We present Orthros, a 128-bit block pseudorandom function. It is designed with primary
focus on latency of fully unrolled circuits. For this purpose, we adopt a parallel structure …

Boomeyong: Embedding yoyo within boomerang and its applications to key recovery attacks on AES and pholkos

M Rahman, D Saha, G Paul - IACR Transactions on Symmetric …, 2021 - er.ceres.rub.de
This work investigates a generic way of combining two very effective and well-studied
cryptanalytic tools, proposed almost 18 years apart, namely the boomerang attack …

An application of the khumbelo function on the camellia algorithm to prevent attacks in iot devices

KD Muthavhine, M Sumbwanyambe - IEEE Access, 2023 - ieeexplore.ieee.org
Camellia is an encryption algorithm implemented in many Internet of Things (IoT) devices.
However, intruders attack the Camellia cipher using Substitution Box (S-Box) distinguishers …

The Retracing Boomerang Attack, with Application to Reduced-Round AES

O Dunkelman, N Keller, E Ronen, A Shamir - Journal of Cryptology, 2024 - Springer
Boomerang attacks are extensions of differential attacks that make it possible to combine
two unrelated differential properties of the first and second part of a cryptosystem with …

New properties of the double boomerang connectivity table

Q Yang, L Song, S Sun, D Shi, L Hu - IACR Transactions on Symmetric …, 2022 - tosc.iacr.org
The double boomerang connectivity table (DBCT) is a new table proposed recently to
capture the behavior of two consecutive S-boxes in boomerang attacks. In this paper, we …