A Meet-in-the-Middle Attack on 8-Round AES

被引:0
|
作者
Demirci, Hueseyin [1 ]
Selcuk, Ali Aydin [2 ]
机构
[1] Tubitak UEKAE, TR-41470 Gebze, Kocaeli, Turkey
[2] Bilkent Univ, Dept Comp Engn, TR-06800 Ankara, Turkey
来源
FAST SOFTWARE ENCRYPTION | 2008年 / 5086卷
关键词
AES; Rijndael; meet-in-the-middle cryptanalysis; square attack;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present a 5-round distinguisher for AES. We exploit this distinguisher to develop a meet-in-the-middle attack on 7 rounds of AES-192 and 8 rounds of AES-256. We also give a time-memory tradeoff generalization of the basic attack which gives a better balancing between different costs of the attack. As an additional note, we state a new square-like property of the AES algorithm.
引用
收藏
页码:116 / +
页数:3
相关论文
共 50 条
  • [41] Improved meet-in-the-middle attacks on reduced-round Piccolo
    Ya LIU
    Liang CHENG
    Zhiqiang LIU
    Wei LI
    Qingju WANG
    Dawu GU
    ScienceChina(InformationSciences), 2018, 61 (03) : 95 - 107
  • [42] Improved meet-in-the-middle attacks on reduced-round Piccolo
    Liu, Ya
    Cheng, Liang
    Liu, Zhiqiang
    Li, Wei
    Wang, Qingju
    Gu, Dawu
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
  • [43] Improved meet-in-the-middle attacks on reduced-round DES
    Dunkelman, Orr
    Sekar, Gautharn
    Preneel, Bart
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 86 - 100
  • [44] Improved Meet-in-the-Middle Attacks on Round-Reduced ARIA
    Bai, Dongxia
    Yu, Hongbo
    INFORMATION SECURITY (ISC 2013), 2015, 7807 : 155 - 168
  • [45] Improved meet-in-the-middle attacks on reduced-round Piccolo
    Ya Liu
    Liang Cheng
    Zhiqiang Liu
    Wei Li
    Qingju Wang
    Dawu Gu
    Science China Information Sciences, 2018, 61
  • [46] Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
    Dong, Xiaoyang
    Guo, Jian
    Li, Shun
    Pham, Phuong
    Zhang, Tianyu
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 158 - 187
  • [47] Automatic Demirci-Selcuk Meet-In-The-Middle Attack On SIMON
    Lv, Yin
    Shi, Danping
    Guo, Yi
    Chen, Qiu
    Hu, Lei
    Guo, Zihui
    COMPUTER JOURNAL, 2023, 66 (12): : 3052 - 3068
  • [48] Meet-in-the-Middle Attack on the 15-Round Variant of the Lightweight Block Cipher Shakey for Protection of IoT Devices
    Yada, Kohan
    Igarashi, Yasutaka
    2024 IEEE TENTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS, ICCE 2024, 2024, : 433 - 438
  • [49] Side-Channel Attack Using Meet-in-the-Middle Technique
    Kim, Jongsung
    Hong, Seokhie
    COMPUTER JOURNAL, 2010, 53 (07): : 934 - 938
  • [50] Parallelizing the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack
    Wunderer, Thomas
    Burger, Michael
    Giang Nam Nguyen
    2018 21ST IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2018), 2018, : 185 - 193