Abstract
Serpent is one of the 5 AES finalists. The best attack published so far analyzes up to 9 rounds. In this paper we present attacks on 7-round, 8-round, and 10-round variants of Serpent. We attack a 7-round variant with all key lengths, and 8- and 10-round variants with 256-bit keys. The 10-round attack on the 256-bit keys variants is the best published attack on the cipher. The attack enhances the amplified boomerang attack and uses better differentials. We also present the best 3-round, 4-round, 5-round and 6-round differential characteristics of Serpent.
The work described in this paper has been supported by the European Commission through the IST Programme under Contract IST-1999-12324 and by the fund for the promotion of research at the Technion.
Chapter PDF
Similar content being viewed by others
References
R. Anderson, E. Biham, L.R. Knudsen, Serpent: A Proposal for the Advanced Encryption Standard, NIST AES Proposal, 1998.
E. Biham, A Note on Comparing the AES Candidates, Second AES Candidate Conference, 1999.
E. Biham, A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.
O. Dunkelman, An Analysis of Serpent-p and Serpent-p-ns, presented at the rump session of the Second AES Candidate Conference, 1999. Available on-line at http://vipe.technion.ac.il/~orrd/crypt/.
T. Kohno, J. Kelsey, B. Schneier, Preliminary Cryptanalysis of Reduced-Round Serpent, Third AES Candidate Conference, 2000.
J. Kelsey, T. Kohno, B. Schneier, Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent, proceedings of Fast Software Encryption 2000, to appear.
L.R. Knudsen, Truncated and Higher Order Differentials, proceedings of Fast Software Encryption 2, Springer-Verlag, LNCS 1008, pp. 196–211, 1995.
NIST, A Request for Candidate Algorithm Nominations for the AES, available on-line at http://www.nist.gov/aes/.
D. Wagner, The Boomerang Attack, proceedings of Fast Software Encryption 1999, Springer Verlag, LNCS 1636, pp. 156–170, 1999.
X.Y. Wang, L.C.K. Hui, C.F. Chong, W.W. Tsang, H.W. Chan, The Differential Cryptanalysis of an AES Finalist-Serpent, Technical Report TR-2000-04. Available on-line at: http://www.csis.hku.hk/research/techreps/.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Biham, E., Dunkelman, O., Keller, N. (2001). The Rectangle Attack — Rectangling the Serpent. In: Pfitzmann, B. (eds) Advances in Cryptology — EUROCRYPT 2001. EUROCRYPT 2001. Lecture Notes in Computer Science, vol 2045. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44987-6_21
Download citation
DOI: https://doi.org/10.1007/3-540-44987-6_21
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42070-5
Online ISBN: 978-3-540-44987-4
eBook Packages: Springer Book Archive