Improving the Biclique Cryptanalysis of AES

被引:21
作者
Tao, Biaoshuai [1 ]
Wu, Hongjun [1 ]
机构
[1] Nanyang Technol Univ, Singapore 639798, Singapore
来源
INFORMATION SECURITY AND PRIVACY (ACISP 2015) | 2015年 / 9144卷
关键词
AES; Biclique attack; Large biclique; SINGLE-KEY ATTACKS; DIFFERENTIAL CRYPTANALYSIS; AES-192;
D O I
10.1007/978-3-319-19962-7_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Biclique attack is currently the only key-recovery attack on the full AES with a single key. Bogdanov et al. applied it to all the three versions of AES by constructing bicliques with size 2(8) x 2(8) and reducing the number of S-boxes computed in the matching phase. Their results were improved later by better selections of differential characteristics in the biclique construction. In this paper, we improve the biclique attack by increasing the biclique size to 2(16) X 2(8) and 2(16) X 2(16). We have a biclique attack on each of the following AES versions: -AES-128 with time complexity 212613 and data complexity 2(16), AES-128 with time complexity 212601 and data complexity 272, - AES-192 with time complexity 218991 and data complexity 248, and -AES-256 with time complexity 225427 and data complexity 2(40). Our results have the best time complexities among all the existing keyrecovery attacks with data less than the entire code book.
引用
收藏
页码:39 / 56
页数:18
相关论文
共 23 条
[1]   A Framework for Automated Independent-Biclique Cryptanalysis [J].
Abed, Farzaneh ;
Forler, Christian ;
List, Eik ;
Lucks, Stefan ;
Wenzel, Jakob .
FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 :561-581
[2]   Impossible differential attack on seven-round AES-128 [J].
Bahrok, B. ;
Aref, M. R. .
IET INFORMATION SECURITY, 2008, 2 (02) :28-32
[3]  
Biham E, 2006, LECT NOTES COMPUT SC, V3860, P21
[4]  
Biryukov A, 2010, LECT NOTES COMPUT SC, V6110, P299
[5]  
Biryukov A, 2009, LECT NOTES COMPUT SC, V5912, P1, DOI 10.1007/978-3-642-10366-7_1
[6]  
Biryukov A, 2009, LECT NOTES COMPUT SC, V5677, P231, DOI 10.1007/978-3-642-03356-8_14
[7]  
Bogdanov Andrey, 2015, Information Security and Cryptology - ICISC 2014. 17th International Conference. Revised Selected Papers: LNCS 8949, P160, DOI 10.1007/978-3-319-15943-0_10
[8]  
Bogdanov A., 2012, ECRYPT WORKSH SHARCS
[9]  
Bogdanov A, 2011, LECT NOTES COMPUT SC, V7073, P344, DOI 10.1007/978-3-642-25385-0_19
[10]  
Canteaut A, 2013, LECT NOTES COMPUT SC, V8042, P222, DOI 10.1007/978-3-642-40041-4_13