[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/978-3-030-23696-0_15guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Practical Attacks on Reduced-Round AES

Published: 09 July 2019 Publication History

Abstract

In this paper we investigate the security of 5-round AES against two different attacks in an adaptive setting. We present a practical key-recovery attack on 5-round AES with a secret s-box that requires 232 adaptively chosen ciphertexts, which is as far as we know a new record. In addition, we present a new and practical key-independent distinguisher for 5-round AES which requires 227.2 adaptively chosen ciphertexts. While the data complexity of this distinguisher is in the same range as the current best 5-round distinguisher [14], it exploits new structural properties of 5-round AES.

References

[1]
Bar-On Achiya, Dunkelman Orr, Keller Nathan, Ronen Eyal, and Shamir Adi Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities Lecture Notes in Computer Science 2018 Cham Springer International Publishing 185-212
[2]
Biryukov Alex and Khovratovich Dmitry Related-Key Cryptanalysis of the Full AES-192 and AES-256 Advances in Cryptology – ASIACRYPT 2009 2009 Berlin, Heidelberg Springer Berlin Heidelberg 1-18
[3]
Biryukov Alex, Khovratovich Dmitry, and Nikolić Ivica Distinguisher and Related-Key Attack on the Full AES-256 Advances in Cryptology - CRYPTO 2009 2009 Berlin, Heidelberg Springer Berlin Heidelberg 231-249
[4]
Bouillaguet C, Derbez P, Dunkelman O, Fouque P, Keller N, and Rijmen V Low-data complexity attacks on AES IEEE Trans. Inf. Theor. 2012 58 11 7002-7017
[5]
Daemen Joan and Rijmen Vincent The Block Cipher Rijndael Lecture Notes in Computer Science 2000 Berlin, Heidelberg Springer Berlin Heidelberg 277-284
[6]
Derbez Patrick, Fouque Pierre-Alain, and Jean Jérémy Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting Advances in Cryptology – EUROCRYPT 2013 2013 Berlin, Heidelberg Springer Berlin Heidelberg 371-387
[7]
Dunkelman Orr, Keller Nathan, and Shamir Adi Improved Single-Key Attacks on 8-Round AES-192 and AES-256 Advances in Cryptology - ASIACRYPT 2010 2010 Berlin, Heidelberg Springer Berlin Heidelberg 158-176
[8]
Ferguson Niels, Kelsey John, Lucks Stefan, Schneier Bruce, Stay Mike, Wagner David, and Whiting Doug Improved Cryptanalysis of Rijndael Fast Software Encryption 2001 Berlin, Heidelberg Springer Berlin Heidelberg 213-230
[9]
Gilbert, H., Minier, M.: A collision attack on 7 rounds of rijndael. In: AES Candidate Conference, pp. 230–241 (2000)
[10]
Grassi Lorenzo MixColumns Properties and Attacks on (Round-Reduced) AES with a Single Secret S-Box Lecture Notes in Computer Science 2018 Cham Springer International Publishing 243-263
[11]
Grassi L, Rechberger C, and Rønjom SSubspace trail cryptanalysis and its applications to AESIACR Trans. Symmetric Cryptol.201620162192-22510.13154/tosc.v2016.i2.192-225
[12]
Grassi Lorenzo, Rechberger Christian, and Rønjom Sondre A New Structural-Differential Property of 5-Round AES Lecture Notes in Computer Science 2017 Cham Springer International Publishing 289-317
[13]
Gueron Shay and Mouha Nicky Simpira v2: A Family of Efficient Permutations Using the AES Round Function Advances in Cryptology – ASIACRYPT 2016 2016 Berlin, Heidelberg Springer Berlin Heidelberg 95-125
[14]
Rønjom Sondre, Bardeh Navid Ghaedi, and Helleseth Tor Yoyo Tricks with AES Advances in Cryptology – ASIACRYPT 2017 2017 Cham Springer International Publishing 217-243
[15]
Sun Bing, Liu Meicheng, Guo Jian, Qu Longjiang, and Rijmen Vincent New Insights on AES-Like SPN Ciphers Advances in Cryptology – CRYPTO 2016 2016 Berlin, Heidelberg Springer Berlin Heidelberg 605-624
[16]
Tiessen Tyge, Knudsen Lars R., Kölbl Stefan, and Lauridsen Martin M. Security of the AES with a Secret S-Box Fast Software Encryption 2015 Berlin, Heidelberg Springer Berlin Heidelberg 175-189

Cited By

View all
  • (2024)Yoyo attack on 4-round Lai-Massey scheme with secret round functionsDesigns, Codes and Cryptography10.1007/s10623-024-01408-892:9(2655-2684)Online publication date: 1-Sep-2024
  • (2024)Higher-Order Mixture Differentials for AES-Based Block Ciphers and Applications to TweAESAdvances in Information and Computer Security10.1007/978-981-97-7737-2_3(45-64)Online publication date: 17-Sep-2024
  • (2023)Security Verification of Low-Trust ArchitecturesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616643(945-959)Online publication date: 15-Nov-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
Progress in Cryptology – AFRICACRYPT 2019: 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings
Jul 2019
450 pages
ISBN:978-3-030-23695-3
DOI:10.1007/978-3-030-23696-0

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 09 July 2019

Author Tags

  1. AES
  2. Zero-difference
  3. Secret-key distinguisher
  4. Differential
  5. Secret s-box

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Yoyo attack on 4-round Lai-Massey scheme with secret round functionsDesigns, Codes and Cryptography10.1007/s10623-024-01408-892:9(2655-2684)Online publication date: 1-Sep-2024
  • (2024)Higher-Order Mixture Differentials for AES-Based Block Ciphers and Applications to TweAESAdvances in Information and Computer Security10.1007/978-981-97-7737-2_3(45-64)Online publication date: 17-Sep-2024
  • (2023)Security Verification of Low-Trust ArchitecturesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616643(945-959)Online publication date: 15-Nov-2023
  • (2022)Pholkos – Efficient Large-State Tweakable Block Ciphers from the AES Round FunctionTopics in Cryptology – CT-RSA 202210.1007/978-3-030-95312-6_21(511-536)Online publication date: 7-Feb-2022

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media