Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities

被引:30
|
作者
Bar-On, Achiya [1 ]
Dunkelman, Orr [2 ]
Keller, Nathan [1 ]
Ronen, Eyal [3 ]
Shamir, Adi [3 ]
机构
[1] Bar Ilan Univ, Dept Math, Ramat Gan, Israel
[2] Univ Haifa, Comp Sci Dept, Haifa, Israel
[3] Weizmann Inst Sci, Comp Sci Dept, Rehovot, Israel
来源
基金
欧洲研究理事会;
关键词
EFFICIENT; SEARCH;
D O I
10.1007/978-3-319-96881-0_7
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Determining the security of AES is a central problem in cryptanalysis, but progress in this area had been slow and only a handful of cryptanalytic techniques led to significant advancements. At Euro-crypt 2017 Grassi et al. presented a novel type of distinguisher for AES-like structures, but so far all the published attacks which were based on this distinguisher were inferior to previously known attacks in their complexity. In this paper we combine the technique of Grassi et al. with several other techniques to obtain the best known key recovery attack on 5-round AES in the single-key model, reducing its overall complexity from about 2(32) to about 2(22.5). Extending our techniques to 7-round AES, we obtain the best known attacks on AES-192 which use practical amounts of data and memory, breaking the record for such attacks which was obtained 18 years ago by the classical Square attack.
引用
收藏
页码:185 / 212
页数:28
相关论文
共 50 条
  • [41] New attacks against reduced-round versions of IDEA
    Junod, P
    FAST SOFTWARE ENCRYPTION, 2005, 3557 : 384 - 397
  • [42] Integral Attacks on Reduced-Round ARIA Block Cipher
    Li, Yanjun
    Wu, Wenling
    Zhang, Lei
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 19 - 29
  • [43] Exhausting Demirci- Sel, cuk Meet-in-the-Middle Attacks Against Reduced-Round AES
    Derbez, Patrick
    Fouque, Pierre-Alain
    FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 541 - 560
  • [44] New impossible differential attacks on reduced-round Crypton
    Mala, Hamid
    Shakiba, Mohsen
    Dakhilalian, Mohammad
    COMPUTER STANDARDS & INTERFACES, 2010, 32 (04) : 222 - 227
  • [45] Meet-in-the-Middle Attacks on Reduced-Round XTEA
    Sekar, Gautham
    Mouha, Nicky
    Velichkov, Vesselin
    Preneel, Bart
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 250 - +
  • [46] Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256
    Liu, Ya
    Shi, Bing
    Gu, Dawu
    Zhao, Fengyu
    Li, Wei
    Liu, Zhiqiang
    COMPUTER JOURNAL, 2020, 63 (12): : 1859 - 1870
  • [47] Boomerang Attacks on Reduced-Round Midori64
    Gonen, Mehmet Emin
    Gundogn, Muhammed Said
    Otal, Kamil
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 16 (02): : 191 - 203
  • [48] Automated Key Recovery Attacks on Round-Reduced Orthros
    Li, Muzhou
    Sun, Ling
    Wang, Meiqin
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2022, 2022, 13503 : 189 - 213
  • [49] Improved mixture differential attacks on 6-round AES-like ciphers towards time and data complexities
    Yan, Xueping
    Tan, Lin
    Xu, Hong
    Qi, Wenfeng
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 80
  • [50] Improved Integral Attack on Reduced-Round Simeck
    Li, Hang
    Ren, Jiongjiong
    Chen, Shaozhen
    IEEE ACCESS, 2019, 7 : 118806 - 118814