Improved Single-Key Attacks on 9-Round AES-192/256

被引:31
|
作者
Li, Leibo [1 ]
Jia, Keting [2 ]
Wang, Xiaoyun [1 ,3 ]
机构
[1] Shandong Univ, Sch Math, Key Lab Cryptol Technol & Informat Secur, Minist Educ, Jinan 250100, Peoples R China
[2] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[3] Tsinghua Univ, Inst Adv Study, Beijing 100084, Peoples R China
来源
关键词
AES; Block cipher; Meet-in-the-Middle Attack; Differential characteristic; THE-MIDDLE ATTACKS; CRYPTANALYSIS; AES; DISTINGUISHER;
D O I
10.1007/978-3-662-46706-0_7
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper focuses on key-recovery attacks on 9-round AES-192 and AES-256 under single-key model with the framework of the meet-in-the-middle attack. A new technique named key-dependent sieve is introduced to further reduce the size of lookup table of the attack, and the 9-round AES-192 is broken with 2 121 chosen plaintexts, 2(187.5) 9-round encryptions and 2(185) 128-bit words of memory. If the attack starts from the third round, the complexities would be further reduced by a factor of 16. Moreover, the whole attack is split up into a series of weak-key attacks. Then the memory complexity of the attack is saved significantly when we execute these weak attacks in streaming mode. This method is also applied to reduce the memory complexity of the attack on 9-round AES-256.
引用
收藏
页码:127 / 146
页数:20
相关论文
共 50 条
  • [21] New Results in Related Key Impossible Differential Cryptanalysis on Reduced Round AES-192
    Jithendra, K. B.
    Shahana, T. K.
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 291 - 295
  • [22] Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128
    Fouque, Pierre-Alain
    Jean, Jeremy
    Peyrin, Thomas
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT I, 2013, 8042 : 183 - 203
  • [23] Improved Meet-in-the-Middle Attacks on Nine Rounds of the AES-192 Block Cipher
    Lu, Jiqiang
    Zhou, Wenchang
    TOPICS IN CRYPTOLOGY, CT-RSA 2024, 2024, 14643 : 136 - 159
  • [24] A new related-key square attack on 7-round and 8-round AES-192
    Chen, Jie
    Hu Yupu
    Wei Yongzhuang
    Liu Shuanggen
    CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (01): : 145 - 149
  • [25] Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192
    Hong, S
    Kim, J
    Lee, S
    Preneel, B
    FAST SOFTWARE ENCRYPTION, 2005, 3557 : 368 - 383
  • [26] Related-key square attack on AES-192
    Chen, J., 1600, Univ. of Electronic Science and Technology of China (42):
  • [27] Improved Single-Key Attacks on 2-GOST
    Zheng, Qiuhua
    Hu, Yinhao
    Pei, Tao
    Xu, Shengwang
    Yu, Junzhe
    Wu, Ting
    Shen, Yanzhao
    Zeng, Yingpei
    Cui, Tingting
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020 (2020)
  • [28] Impossible differential cryptanalysis method for 7-round AES-192
    Hu, Zhihua
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2012, 52 (SUPPL.1): : 163 - 167
  • [29] Key recovery attacks on reduced-round Joltik-BC in the single-key setting
    Li, Rongjia
    Jin, Chenhui
    Pan, Hongchen
    INFORMATION PROCESSING LETTERS, 2019, 151
  • [30] 简化AES-192和AES-256的相关密钥矩形新攻击
    韦永壮
    胡予濮
    中国科学(F辑:信息科学), 2009, 39 (02) : 246 - 253