Improved Single-Key Attacks on 8-Round AES-192 and AES-256

Springer Science and Business Media LLC - Tập 28 Số 3 - Trang 397-422 - 2015
Orr Dunkelman1, Nathan Keller2, Adi Shamir2
1Computer Science Department, University of Haifa, Haifa, 31905, Israel
2Faculty of Mathematics and Computer Science, Weizmann Institute of Science, P.O. Box 26, Rehovot, 76100, Israel

Tóm tắt

Từ khóa


Tài liệu tham khảo

A. Biryukov, D. Khovratovich, Related-key cryptanalysis of the full AES-192 and AES-256, in Advances in Cryptography, Proceedings of ASIACRYPT 2009. Lecture Notes in Computer Science, vol. 5912 (Springer, Berlin, 2009), pp. 1–18

A. Biryukov, D. Khovratovich, I. Nikolic, Distinguisher and related-key attack on the full AES-256, in Advances in Cryptography, Proceedings of CRYPTO 2009. Lecture Notes in Computer Science, vol. 5677 (Springer, Berlin, 2009), pp. 231–249

A. Biryukov, O. Dunkelman, N. Keller, D. Khovratovich, A. Shamir, Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds, in Advances in Cryptography, Proceedings of EUROCRYPT 2010. Lecture Notes in Computer, vol. 6110 (Springer, Berlin, 2010), pp. 299–319

J. Daemen, V. Rijmen, AES proposal: Rijndael, in NIST AES Proposal (1998)

J. Daemen, V. Rijmen, The Design of Rijndael: AES—the Advanced Encryption Standard (Springer, Berlin, 2002)

H. Demirci, A. Aydin Selçuk, A meet-in-the-middle attack on 8-round AES, in Proceedings of Fast Software Encryption 2008. Lecture Notes in Computer Science, vol. 5086 (Springer, Berlin, 2008), pp. 116–126

H. Demirci, I. Taskin, M. Çoban, A. Baysal, Improved meet-in-the-middle attacks on AES, in Proceedings of INDOCRYPT 2009. Lecture Notes in Computer Science, vol. 5922 (Springer, Berlin, 2009), pp. 144–156

P. Derbez, P.-A. Fouque, Exhausting Demirci–Selcuk Meet-in-the-Middle Attacks against Reduced-Round AES, pre-proceedings of Fast Software Encryption 2013. Lecture Notes in Computer Science (2013, to appear)

P. Derbez, P.-A. Fouque, J. Jean, Improved key recovery attacks on reduced-round AES in the single-key setting, in Advances in Cryptology, Eurocrypt 2013 (2013). doi: 10.1007/978-3-642-38348-9_23

O. Dunkelman, N. Keller, A new attack on the LEX stream cipher, in Advances in Cryptography, Proceedings of ASIACRYPT 2008. Lecture Notes in Computer Science, vol. 5350 (Springer, Berlin, 2008), pp. 539–556. doi: 10.1007/978-3-540-89255-7_33

N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. Wagner, D. Whiting, Improved cryptanalysis of Rijndael, in Proceedings of Fast Software Encryption 2000. Lecture Notes in Computer Science 1978 (Springer, Berlin, 2001), pp. 213–230. doi: 10.1007/3-540-44706-7_15

H. Gilbert, M. Minier, A collision attack on 7 rounds of Rijndael, in Proceedings of the Third AES Candidate Conference (AES3), New York, USA (2000), pp. 230–241

J. Lu, O. Dunkelman, N. Keller, J. Kim, New impossible differential attacks on AES, in Proceedings of INDOCRYPT 2008. Lecture Notes in Computer Science, vol. 5365 (Springer, Berlin, 2008), pp. 279–293

H. Mala, M. Dakhilalian, V. Rijmen, M. Modarres-Hashemi, Improved impossible differential cryptanalysis of 7-round AES-128, in Proceedings of INDOCRYPT 2010. Lecture Notes in Computer Science, vol. 6498 (Springer, Berlin, 2010), pp. 282–291

US National Institute of Standards and Technology, Advanced Encryption Standard, Federal Information Processing Standards Publications, vol. 197 (2001)

W. Zhang, W. Wu, L. Zhang, D. Feng, Improved related-key impossible differential attacks on reduced-round AES-192, in Proceedings of Selected Areas in Cryptography 2006. Lecture Notes in Computer Science, vol. 4356 (Springer, Berlin, 2007), pp. 15–27