Related-key impossible differential attacks on 8-round AES-192

被引:0
|
作者
Biham, E [1 ]
Dunkelman, O
Keller, N
机构
[1] Technion Israel Inst Technol, Dept Comp Sci, IL-32000 Haifa, Israel
[2] Hebrew Univ Jerusalem, Einstein Inst Math, IL-91904 Jerusalem, Israel
关键词
AES; related-key differentials; impossible differentials;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we examine the strength of AES against the related-key impossible differential attack, following the work of Jakimoski and Desmedt [12]. We use several additional observations to substantially improve the data and time complexities of their attacks. Amongst our results, we present a related-key attack on 7-round AES-192 with data complexity of 2 56 chosen plaintexts (instead of 2(111)). Our attack on 8-round AES-192 has data complexity of 2(68.5) chosen plaintexts (instead of 2(88)). The time complexities of our attacks is also substantially lower than the time complexities of previous attacks.
引用
收藏
页码:21 / 33
页数:13
相关论文
共 50 条
  • [31] Related-key Impossible Differential Cryptanalysis of Full-round HIGHT
    Rostami, Saeed
    Chafjiri, Sadegh Bamohabbat
    Tabatabaei, Seyed Amir Hossein
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 537 - 542
  • [32] Truncated differential attacks on 8-round CRYPTON
    Kim, J
    Hong, S
    Lee, S
    Song, J
    Yang, H
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 446 - 456
  • [33] AES Variants Secure against Related-Key Differential and Boomerang Attacks
    Choy, Jiali
    Zhang, Aileen
    Khoo, Khoongming
    Henricksen, Matt
    Poschmann, Axel
    INFORMATION SECURITY THEORY AND PRACTICE: SECURITY AND PRIVACY OF MOBILE DEVICES IN WIRELESS COMMUNICATION, 2011, 6633 : 191 - 207
  • [34] Related-Key Differential Analysis of the AES
    Boura, Christina
    Derbez, Patrick
    Funk, Margot
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (04) : 215 - 243
  • [35] New Related-Key Boomerang Attacks on AES
    Gorski, Michael
    Lucks, Stefan
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 266 - 278
  • [36] Related-Key Impossible Differential Cryptanalysis of LBlock
    XIE Min
    LI Jingjing
    ZANG Yuechuan
    ChineseJournalofElectronics, 2017, 26 (01) : 35 - 41
  • [37] Related-Key Impossible Differential Cryptanalysis of LBlock
    Xie Min
    Li Jingjing
    Zang Yuechuan
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (01) : 35 - 41
  • [38] Related-key Impossible Differential Attack on Piccolo
    Xu L.-H.
    Guo J.-S.
    Cui J.-Y.
    Li M.-M.
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 (08): : 2349 - 2361
  • [39] Practical Related-Key Forgery Attacks on Full-Round TinyJAMBU-192/256
    Dunkelman, Orr
    Ghosh, Shibam
    Lambooij, Eran
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (02) : 176 - 188
  • [40] Impossible Differential Cryptanalysis of 8-Round Deoxys-BC-256
    Jiang, Zilong
    Jin, Chenhui
    IEEE ACCESS, 2018, 6 : 8890 - 8895