Improved Single-Key Attacks on 9-Round AES-192/256

被引:31
作者
Li, Leibo [1 ]
Jia, Keting [2 ]
Wang, Xiaoyun [1 ,3 ]
机构
[1] Shandong Univ, Sch Math, Key Lab Cryptol Technol & Informat Secur, Minist Educ, Jinan 250100, Peoples R China
[2] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[3] Tsinghua Univ, Inst Adv Study, Beijing 100084, Peoples R China
来源
FAST SOFTWARE ENCRYPTION, FSE 2014 | 2015年 / 8540卷
关键词
AES; Block cipher; Meet-in-the-Middle Attack; Differential characteristic; THE-MIDDLE ATTACKS; CRYPTANALYSIS; AES; DISTINGUISHER;
D O I
10.1007/978-3-662-46706-0_7
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper focuses on key-recovery attacks on 9-round AES-192 and AES-256 under single-key model with the framework of the meet-in-the-middle attack. A new technique named key-dependent sieve is introduced to further reduce the size of lookup table of the attack, and the 9-round AES-192 is broken with 2 121 chosen plaintexts, 2(187.5) 9-round encryptions and 2(185) 128-bit words of memory. If the attack starts from the third round, the complexities would be further reduced by a factor of 16. Moreover, the whole attack is split up into a series of weak-key attacks. Then the memory complexity of the attack is saved significantly when we execute these weak attacks in streaming mode. This method is also applied to reduce the memory complexity of the attack on 9-round AES-256.
引用
收藏
页码:127 / 146
页数:20
相关论文
共 19 条
  • [1] [Anonymous], 2000, PROC AES3
  • [2] Biryukov A, 2010, LECT NOTES COMPUT SC, V6110, P299
  • [3] Biryukov A, 2009, LECT NOTES COMPUT SC, V5912, P1, DOI 10.1007/978-3-642-10366-7_1
  • [4] Biryukov A, 2009, LECT NOTES COMPUT SC, V5677, P231, DOI 10.1007/978-3-642-03356-8_14
  • [5] Bogdanov A, 2011, LECT NOTES COMPUT SC, V7073, P344, DOI 10.1007/978-3-642-25385-0_19
  • [6] Daemen J., 1998, 1 ADV ENCR STAND AES
  • [7] Demirci H, 2008, LECT NOTES COMPUT SC, V5086, P116
  • [8] Demirci H, 2009, LECT NOTES COMPUT SC, V5922, P144, DOI 10.1007/978-3-642-10628-6_10
  • [9] Exhausting Demirci- Sel, cuk Meet-in-the-Middle Attacks Against Reduced-Round AES
    Derbez, Patrick
    Fouque, Pierre-Alain
    [J]. FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 541 - 560
  • [10] Derbez P, 2013, LECT NOTES COMPUT SC, V7881, P371, DOI 10.1007/978-3-642-38348-9_23