Improved Single-Key Attacks on 9-Round AES-192/256

被引:31
|
作者
Li, Leibo [1 ]
Jia, Keting [2 ]
Wang, Xiaoyun [1 ,3 ]
机构
[1] Shandong Univ, Sch Math, Key Lab Cryptol Technol & Informat Secur, Minist Educ, Jinan 250100, Peoples R China
[2] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
[3] Tsinghua Univ, Inst Adv Study, Beijing 100084, Peoples R China
来源
关键词
AES; Block cipher; Meet-in-the-Middle Attack; Differential characteristic; THE-MIDDLE ATTACKS; CRYPTANALYSIS; AES; DISTINGUISHER;
D O I
10.1007/978-3-662-46706-0_7
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper focuses on key-recovery attacks on 9-round AES-192 and AES-256 under single-key model with the framework of the meet-in-the-middle attack. A new technique named key-dependent sieve is introduced to further reduce the size of lookup table of the attack, and the 9-round AES-192 is broken with 2 121 chosen plaintexts, 2(187.5) 9-round encryptions and 2(185) 128-bit words of memory. If the attack starts from the third round, the complexities would be further reduced by a factor of 16. Moreover, the whole attack is split up into a series of weak-key attacks. Then the memory complexity of the attack is saved significantly when we execute these weak attacks in streaming mode. This method is also applied to reduce the memory complexity of the attack on 9-round AES-256.
引用
收藏
页码:127 / 146
页数:20
相关论文
共 50 条
  • [31] Improved preimage attacks on hash modes of 8-round AES-256
    Hong, Deukjo
    Kim, Dong-Chan
    Kwon, Daesung
    Kim, Jongsung
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (22) : 14525 - 14539
  • [32] Improved preimage attacks on hash modes of 8-round AES-256
    Deukjo Hong
    Dong-Chan Kim
    Daesung Kwon
    Jongsung Kim
    Multimedia Tools and Applications, 2016, 75 : 14525 - 14539
  • [33] Related-key impossible differential attacks on reduced-round AES-256
    State Key Laboratory of Information Security, Graduate University, Chinese Acad. of Sci., Beijing 100049, China
    不详
    Ruan Jian Xue Bao, 2007, 11 (2893-2901):
  • [34] A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256
    Chien, Jiageng
    Hirose, Shoichi
    Kuwakado, Hidenori
    Miyaji, Atsuko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (01) : 14 - 21
  • [35] Practical Related-Key Forgery Attacks on Full-Round TinyJAMBU-192/256
    Dunkelman, Orr
    Ghosh, Shibam
    Lambooij, Eran
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (02) : 176 - 188
  • [36] 可兼容AES-128、AES-192、AES-256串行AES加密解密电路设计
    韩少男
    李晓江
    微电子学与计算机, 2010, 27 (11) : 40 - 45+50
  • [37] Meet-in-the-Middle Key Recovery Attacks on a Single-Key Two-Round Even-Mansour Cipher
    Isobe, Takanori
    Shibutani, Kyoji
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01): : 17 - 26
  • [38] Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting
    Abdelkhalek, Ahmed
    Tolba, Mohamed
    Youssef, Amr M.
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 139 - 150
  • [39] Improved Quantum Rebound Attacks on Double Block Length Hashing with Round-Reduced AES-256 and ARIA-256
    Lee, Dongjae
    Hong, Seokhie
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (03) : 238 - 265
  • [40] Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities
    Bar-On, Achiya
    Dunkelman, Orr
    Keller, Nathan
    Ronen, Eyal
    Shamir, Adi
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 185 - 212