A Meet-in-the-Middle Attack on 8-Round AES

被引:0
|
作者
Demirci, Hueseyin [1 ]
Selcuk, Ali Aydin [2 ]
机构
[1] Tubitak UEKAE, TR-41470 Gebze, Kocaeli, Turkey
[2] Bilkent Univ, Dept Comp Engn, TR-06800 Ankara, Turkey
来源
FAST SOFTWARE ENCRYPTION | 2008年 / 5086卷
关键词
AES; Rijndael; meet-in-the-middle cryptanalysis; square attack;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present a 5-round distinguisher for AES. We exploit this distinguisher to develop a meet-in-the-middle attack on 7 rounds of AES-192 and 8 rounds of AES-256. We also give a time-memory tradeoff generalization of the basic attack which gives a better balancing between different costs of the attack. As an additional note, we state a new square-like property of the AES algorithm.
引用
收藏
页码:116 / +
页数:3
相关论文
共 50 条
  • [21] Improved meet-in-the-middle attack on reduced-round Kiasu-BC algorithm
    Li M.
    Chen S.
    Tongxin Xuebao/Journal on Communications, 2022, 43 (07): : 41 - 48
  • [22] Meet-in-the-middle Attack on RAIN-128
    Du X.
    Zheng Y.
    Liang L.
    Li K.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2024, 46 (01): : 327 - 334
  • [23] A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique
    Hao, Yonglin
    Bai, Dongxia
    Li, Leibo
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 166 - 183
  • [24] Quantum meet-in-the-middle attack on Feistel construction
    Yinsong Xu
    Zheng Yuan
    Quantum Information Processing, 22
  • [25] Quantum meet-in-the-middle attack on Feistel construction
    Xu, Yinsong
    Yuan, Zheng
    QUANTUM INFORMATION PROCESSING, 2023, 22 (03)
  • [26] Improved meet-in-the-middle attack on ARIA cipher
    Institute of Cyberspace Security, The PLA Information Engineering University, Zhengzhou
    450001, China
    不详
    450001, China
    Tongxin Xuebao, 3
  • [27] A New Method for Meet-in-the-Middle Attacks on Reduced AES
    Dong Xiaoli
    Hu Yupu
    Wei Yongzhuang
    Chen Jie
    CHINA COMMUNICATIONS, 2011, 8 (02) : 21 - 25
  • [28] The parallel-cut meet-in-the-middle attack
    Nikolic, Ivica
    Wang, Lei
    Wu, Shuang
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2015, 7 (03): : 331 - 345
  • [29] Meet-in-the-Middle and Impossible Differential Fault Analysis on AES
    Derbez, Patrick
    Fouque, Pierre-Alain
    Leresteux, Delphine
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 274 - +
  • [30] A real-world attack of 8-round CLEFIA
    Tang, Xue-Hai
    Sun, Bing
    Li, Chao
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2011, 39 (07): : 1608 - 1612