Low-Data Complexity Attacks on AES

被引:36
作者
Bouillaguet, Charles [1 ]
Derbez, Patrick [2 ]
Dunkelman, Orr [3 ]
Fouque, Pierre-Alain [2 ]
Keller, Nathan [4 ]
Rijmen, Vincent [5 ,6 ]
机构
[1] Versailles St Quentin En Yvelines Univ, F-78000 Versailles, France
[2] Ecole Normale Super, Dept Informat, F-75005 Paris, France
[3] Univ Haifa, Dept Comp Sci, IL-31905 Haifa, Israel
[4] Bar Ilan Univ, Dept Math, IL-52900 Ramat Gan, Israel
[5] Univ Louvain, Dept Elect Engn ESAT SCD COSIC, B-3000 Louvain, Belgium
[6] Secur Dept IBBT, B-3001 Louvain, Belgium
关键词
Advanced Encryption Standard (AES); cryptanalysis; reflection attacks; slide attacks; IMPOSSIBLE DIFFERENTIAL CRYPTANALYSIS; STREAM CIPHER; KEY ATTACK; AES-192; SEARCH;
D O I
10.1109/TIT.2012.2207880
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The majority of current attacks on reduced-round variants of block ciphers seeks to maximize the number of rounds that can be broken, using less data than the entire codebook and less time than exhaustive key search. In this paper, we pursue a different approach, restricting the data available to the adversary to a few plaintext/ciphertext pairs. We argue that consideration of such attacks (which received little attention in recent years) improves our understanding of the security of block ciphers and of other cryptographic primitives based on block ciphers. In particular, these attacks can be leveraged to more complex attacks, either on the block cipher itself or on other primitives (e.g., stream ciphers, MACs, or hash functions) that use a small number of rounds of the block cipher as one of their components. As a case study, we consider the Advanced Encryption Standard (AES)-the most widely used block cipher. The AES round function is used in many cryptographic primitives, such as the hash functions Lane, SHAvite-3, and Vortex or the message authentication codes ALPHA-MAC, Pelican, and Marvin. We present attacks on up to four rounds of AES that require at most three known/chosen plaintexts. We then apply these attacks to cryptanalyze an AES-based stream cipher (which follows the leak extraction methodology), and to mount the best known plaintext attack on six-round AES.
引用
收藏
页码:7002 / 7017
页数:16
相关论文
共 60 条
[21]  
Bogdanov A., 2007055 IACR
[22]  
Bouillaguet C, 2011, LECT NOTES COMPUT SC, V6841, P169, DOI 10.1007/978-3-642-22792-9_10
[23]  
Courtois N. T., 2011211 IACR
[24]  
Courtois NT, 2008, LECT NOTES COMPUT SC, V5086, P97
[25]  
Daemen J, 2005, LECT NOTES COMPUT SC, V3557, P1
[26]  
Daemen J., 1998, NIST AES Proposal
[27]  
Daemen J., 2005088 IACR
[28]  
Daemen Joan, 2020, Information Security and Cryptography, V2nd
[29]  
Demirci H, 2008, LECT NOTES COMPUT SC, V5086, P116
[30]  
Derbez P., 2010, RAPPORT STAGE