Key Structures: Improved Related-Key Boomerang Attack Against the Full AES-256

被引:5
|
作者
Guo, Jian [1 ]
Song, Ling [2 ]
Wang, Haoyang [3 ]
机构
[1] Nanyang Technol Univ, Singapore, Singapore
[2] Jinan Univ, Guangzhou, Peoples R China
[3] Shanghai Jiao Tong Univ, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
AES; Differential; Boomerang; Key structure; Related key; RECTANGLE ATTACK; CRYPTANALYSIS; VARIANTS; AES-192; MODES;
D O I
10.1007/978-3-031-22301-3_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces structure to key, in the related-key attack settings. While the idea of structure has been long used in key-recovery attacks against block ciphers to enjoy the birthday effect, the same had not been applied to key materials due to the fact that key structure results in uncontrolled differences in key and hence affects the validity or probabilities of the differential trails. We apply this simple idea to improve the related-key boomerang attack against AES-256 by Biryukov and Khovratovich in 2009. Surprisingly, it turns out to be effective, i.e., both data and time complexities are reduced by a factor of about 2(8), to 2(92) and 2(91) respectively, at the cost of the amount of required keys increased from 4 to 2(19). There exist some tradeoffs between the data/time complexity and the number of keys. To the best of our knowledge, this is the first essential improvement of the attack against the full AES-256 since 2009. It will be interesting to see if the structure technique can be applied to other AES-like block ciphers, and to tweaks rather than keys of tweakable block ciphers so the amount of required keys of the attack will not be affected.
引用
收藏
页码:3 / 23
页数:21
相关论文
共 50 条
  • [41] Related-Key Differential Attack on Round-Reduced Bel-T-256
    Abdelkhalek, Ahmed
    Tolba, Mohamed
    Youssef, Amr M.
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (05) : 859 - 862
  • [42] Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512
    Chen, Jiazhe
    Jia, Keting
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 1 - 18
  • [43] A weak key class of XTEA for a related-key rectangle attack
    Lee, Eunjin
    Hong, Deukjo
    Chang, Donghoon
    Hong, Seokhie
    Lim, Jongin
    PROGRESS IN CRYPTOLOGY - VIETCRYPT 2006, 2006, 4341 : 286 - +
  • [44] New related-key attack on 7-round Rijndael-128/256
    School of Computer Science and Technology, Anhui University, Hefei 230039, China
    不详
    J. Comput. Inf. Syst., 2012, 14 (5893-5900):
  • [45] Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis
    Kim, Jongsung
    Hong, Seokhie
    Preneel, Bart
    Biham, Eli
    Dunkelman, Orr
    Keller, Nathan
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (07) : 4948 - 4966
  • [46] A Related-Key Attack against Multiple Encryption Based on Fixed Points
    Bay, Asli
    Mashatan, Atefeh
    Vaudenay, Serge
    E-BUSINESS AND TELECOMMUNICATIONS, 2012, 314 : 264 - 280
  • [47] A General Framework for the Related-Key Linear Attack Against Block Ciphers with Linear Key Schedules
    Lee, Jung-Keun
    Koo, Bonwook
    Kim, Woo-Hwan
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2019, 2020, 11959 : 194 - 224
  • [48] Security of LBlock-s against Related-Key Differential Attack
    Shan, Jinyong
    Hu, Lei
    Sun, Siwei
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 1278 - 1283
  • [49] RELATED-KEY ATTACK AGAINST TRIPLE ENCRYPTION BASED ON FIXED POINTS
    Vaudenay, Serge
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 59 - 67
  • [50] Related-key Impossible Boomerang Cryptanalysis on LBlock-s
    Xie, Min
    Zeng, Qiya
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (11): : 5717 - 5730