Key Structures: Improved Related-Key Boomerang Attack Against the Full AES-256

被引:5
|
作者
Guo, Jian [1 ]
Song, Ling [2 ]
Wang, Haoyang [3 ]
机构
[1] Nanyang Technol Univ, Singapore, Singapore
[2] Jinan Univ, Guangzhou, Peoples R China
[3] Shanghai Jiao Tong Univ, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
AES; Differential; Boomerang; Key structure; Related key; RECTANGLE ATTACK; CRYPTANALYSIS; VARIANTS; AES-192; MODES;
D O I
10.1007/978-3-031-22301-3_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces structure to key, in the related-key attack settings. While the idea of structure has been long used in key-recovery attacks against block ciphers to enjoy the birthday effect, the same had not been applied to key materials due to the fact that key structure results in uncontrolled differences in key and hence affects the validity or probabilities of the differential trails. We apply this simple idea to improve the related-key boomerang attack against AES-256 by Biryukov and Khovratovich in 2009. Surprisingly, it turns out to be effective, i.e., both data and time complexities are reduced by a factor of about 2(8), to 2(92) and 2(91) respectively, at the cost of the amount of required keys increased from 4 to 2(19). There exist some tradeoffs between the data/time complexity and the number of keys. To the best of our knowledge, this is the first essential improvement of the attack against the full AES-256 since 2009. It will be interesting to see if the structure technique can be applied to other AES-like block ciphers, and to tweaks rather than keys of tweakable block ciphers so the amount of required keys of the attack will not be affected.
引用
收藏
页码:3 / 23
页数:21
相关论文
共 50 条
  • [1] Distinguisher and Related-Key Attack on the Full AES-256
    Biryukov, Alex
    Khovratovich, Dmitry
    Nikolic, Ivica
    ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 231 - 249
  • [2] Related-Key Cryptanalysis of the Full AES-192 and AES-256
    Biryukov, Alex
    Khovratovich, Dmitry
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 1 - 18
  • [4] Related-key rectangle attacks on reduced AES-192 and AES-256
    Kim, Jongsung
    Hong, Seokhie
    Preneel, Bart
    FAST SOFTWARE ENCRYPTION, 2007, 4593 : 225 - +
  • [5] New related-key rectangle attacks on reduced AES-192 and AES-256
    Wei YongZhuang
    Hu YuPu
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2009, 52 (04): : 617 - 626
  • [6] New related-key rectangle attacks on reduced AES-192 and AES-256
    YongZhuang Wei
    YuPu Hu
    Science in China Series F: Information Sciences, 2009, 52 : 617 - 626
  • [7] New related-key rectangle attacks on reduced AES-192 and AES-256
    WEI YongZhuang HU YuPu Key Laboratory of Computer Networks Information Security of Ministry of EducationXidian UniversityXian China
    Science in China(Series F:Information Sciences), 2009, 52 (04) : 617 - 626
  • [8] New related-key rectangle attacks on reduced AES-192 and AES-256
    WEI YongZhuang & HU YuPu Key Laboratory of Computer Networks & Information Security of Ministry of Education
    Science China(Information Sciences), 2009, (04) : 617 - 626
  • [9] Related-key impossible differential attacks on reduced-round AES-256
    State Key Laboratory of Information Security, Graduate University, Chinese Acad. of Sci., Beijing 100049, China
    不详
    Ruan Jian Xue Bao, 2007, 11 (2893-2901):
  • [10] New Related-Key Boomerang Attacks on AES
    Gorski, Michael
    Lucks, Stefan
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 266 - 278