Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities

被引:30
|
作者
Bar-On, Achiya [1 ]
Dunkelman, Orr [2 ]
Keller, Nathan [1 ]
Ronen, Eyal [3 ]
Shamir, Adi [3 ]
机构
[1] Bar Ilan Univ, Dept Math, Ramat Gan, Israel
[2] Univ Haifa, Comp Sci Dept, Haifa, Israel
[3] Weizmann Inst Sci, Comp Sci Dept, Rehovot, Israel
来源
基金
欧洲研究理事会;
关键词
EFFICIENT; SEARCH;
D O I
10.1007/978-3-319-96881-0_7
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Determining the security of AES is a central problem in cryptanalysis, but progress in this area had been slow and only a handful of cryptanalytic techniques led to significant advancements. At Euro-crypt 2017 Grassi et al. presented a novel type of distinguisher for AES-like structures, but so far all the published attacks which were based on this distinguisher were inferior to previously known attacks in their complexity. In this paper we combine the technique of Grassi et al. with several other techniques to obtain the best known key recovery attack on 5-round AES in the single-key model, reducing its overall complexity from about 2(32) to about 2(22.5). Extending our techniques to 7-round AES, we obtain the best known attacks on AES-192 which use practical amounts of data and memory, breaking the record for such attacks which was obtained 18 years ago by the classical Square attack.
引用
收藏
页码:185 / 212
页数:28
相关论文
共 50 条
  • [31] Quantum Demiric-Selcuk Meet-in-the-Middle Attacks on Reduced-Round AES
    Wang, Ping
    Chen, Xiaomei
    Jiang, Guohao
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2022, 61 (01)
  • [32] Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box
    Grassi, Lorenzo
    Schofnegger, Markus
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 312 - 331
  • [33] Practical Analysis of Reduced-Round KECCAK
    Naya-Plasencia, Maria
    Rock, Andrea
    Meier, Willi
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2011, 2011, 7107 : 236 - +
  • [34] Related-Key Attacks on Reduced-Round Hierocrypt-L1
    Taga, Bungo
    Moriai, Shiho
    Aoki, Kazumaro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (01) : 126 - 137
  • [35] Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128
    Liu, Ya
    Yang, Anren
    Dai, Bo
    Li, Wei
    Liu, Zhiqiang
    Gu, Dawu
    Zeng, Zhiqiang
    COMPUTER JOURNAL, 2018, 61 (08): : 1252 - 1258
  • [36] Improved Practical Attacks on Round-Reduced Keccak
    Dinur, Itai
    Dunkelman, Orr
    Shamir, Adi
    JOURNAL OF CRYPTOLOGY, 2014, 27 (02) : 183 - 209
  • [37] Improved Practical Attacks on Round-Reduced Keccak
    Itai Dinur
    Orr Dunkelman
    Adi Shamir
    Journal of Cryptology, 2014, 27 : 183 - 209
  • [38] Improved meet-in-the-middle attacks on reduced-round Joltik-BC
    Li, Manman
    Chen, Shaozhen
    IET INFORMATION SECURITY, 2021, 15 (03) : 247 - 255
  • [39] The Retracing Boomerang Attack, with Application to Reduced-Round AES
    Dunkelman, Orr
    Keller, Nathan
    Ronen, Eyal
    Shamir, Adi
    JOURNAL OF CRYPTOLOGY, 2024, 37 (03)
  • [40] Remarks on Mixture and Yoyo Distinguishers for Reduced-Round AES
    Duan, Chunhui
    Tan, Lin
    Qi, Wenfeng
    2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2020), 2020, : 807 - 815