A New Result of Impossible Differential Attacks on 7-Round AES-192

被引:0
|
作者
Liu Jingmei [1 ]
Zhao Linsen [2 ]
Wang Xinmei [1 ]
机构
[1] Xidian Univ, Natl Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Xian Inst Post & Telecommun, Telecom Dept, Xian 710061, Peoples R China
基金
国家高技术研究发展计划(863计划); 中国国家自然科学基金;
关键词
AES; Rijndael; impossible differential; CRYPTANALYSIS;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper concentrates on the impossible-differential attacks on reduced-round versions of the Rijndael cipher following the framework of the attacks by Biham-Keller and Cheon et al. One method is presented for impossible differential cryptanalysis of 7-round AES-192 combined with classing subsets and exploiting weaknesses in their key schedule. This attack requires about 278chosen plaintexts, demands 2129 words of memory, and performs 2155 7-round AES-192 encryptions, which update the best known impossible differential attacks on reduced AES. Compared with the available results, this cryptanalysis costs fewer chosen-plaintexts and lower computing complexity.
引用
收藏
页码:111 / 115
页数:5
相关论文
共 50 条
  • [31] Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks
    Tsunoo, Yukiyasu
    Saito, Teruo
    Shigeri, Maki
    Kawabata, Takeshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 144 - 152
  • [32] 改进的7轮AES-192的碰撞攻击
    张闻宇
    张海纳
    山东大学学报(理学版), 2007, (04) : 6 - 9
  • [33] Improved Meet-in-the-Middle Attacks on Nine Rounds of the AES-192 Block Cipher
    Lu, Jiqiang
    Zhou, Wenchang
    TOPICS IN CRYPTOLOGY, CT-RSA 2024, 2024, 14643 : 136 - 159
  • [34] Single key recovery attacks on reduced AES-192 and Kalyna-128/256
    Gaoli WANG
    Chunbo ZHU
    ScienceChina(InformationSciences), 2017, 60 (09) : 293 - 304
  • [35] Related-key impossible differential attacks on reduced-round AES-256
    State Key Laboratory of Information Security, Graduate University, Chinese Acad. of Sci., Beijing 100049, China
    不详
    Ruan Jian Xue Bao, 2007, 11 (2893-2901):
  • [36] Single key recovery attacks on reduced AES-192 and Kalyna-128/256
    Gaoli Wang
    Chunbo Zhu
    Science China Information Sciences, 2017, 60
  • [37] Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
    Kang, Jinkeon
    Jeong, Kitae
    Sung, Jaechul
    Hong, Seokhie
    Lee, Kyungho
    JOURNAL OF APPLIED MATHEMATICS, 2013,
  • [38] Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192
    Hong, S
    Kim, J
    Lee, S
    Preneel, B
    FAST SOFTWARE ENCRYPTION, 2005, 3557 : 368 - 383
  • [39] Quantum impossible differential attacks: applications to AES and SKINNY
    David, Nicolas
    Naya-Plasencia, Maria
    Schrottenloher, Andre
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (03) : 723 - 751
  • [40] Quantum impossible differential attacks: applications to AES and SKINNY
    Nicolas David
    María Naya-Plasencia
    André Schrottenloher
    Designs, Codes and Cryptography, 2024, 92 : 723 - 751