期刊文献+

Impossible differential cryptanalysis of advanced encryption standard 被引量:2

Impossible differential cryptanalysis of advanced encryption standard
原文传递
导出
摘要 Impossible differential cryptanalysis is a method recovering secret key, which gets rid of the keys that satisfy impossible differential relations. This paper concentrates on the impossible differential cryptanalysis of Advanced Encryption Standard (AES) and presents two methods for impossible differential cryptanalysis of 7-round AES-192 and 8-round AES-256 combined with time-memory trade-off by exploiting weaknesses in their key schedule. This attack on the reduced to 7-round AES-192 requires about 294.5 chosen plaintexts, demands 2129 words of memory, and performs 2157 7-round AES-192 encryptions. Furthermore, this attack on the reduced to 8-round AES-256 requires about 2^101 chosen plaintexts, demands 2^201 words of memory, and performs 2^228 8-round AES-256 encryptions. Impossible differential cryptanalysis is a method recovering secret key, which gets rid of the keys that satisfy impossible differential relations. This paper concentrates on the impossible differential cryptanalysis of Advanced Encryption Standard (AES) and presents two methods for impossible differential cryptanalysis of 7-round AES-192 and 8-round AES-256 combined with time-memory trade-off by exploiting weaknesses in their key schedule. This attack on the reduced to 7-round AES-192 requires about 294.5 chosen plaintexts, demands 2129 words of memory, and performs 2157 7-round AES-192 encryptions. Furthermore, this attack on the reduced to 8-round AES-256 requires about 2^101 chosen plaintexts, demands 2^201 words of memory, and performs 2^228 8-round AES-256 encryptions.
出处 《Science in China(Series F)》 2007年第3期342-350,共9页 中国科学(F辑英文版)
基金 the National Natural Science Foundation of China (Grant No. 60673072) Foundation of National Laboratory for Modern Communications (Grant No. 51436030105DZ0105)
关键词 block cipher impossible differential cryptanalysis advanced encryption standard CRYPTANALYSIS block cipher, impossible differential cryptanalysis, advanced encryption standard, cryptanalysis
  • 相关文献

参考文献1

二级参考文献9

  • 1[1]http://www.cryptonessie.org.
  • 2[2]Aoki, K., Ichikawa, T., Kanda, M. et al., Specification of Camellia-a 128-bit block cipher, Selected Areas in Cryptography-SAC'2000, Berlin: Springer-Verlag, 2000, 183-191.
  • 3[3]Hatano, Y., Sekine, H., Kaneko, T., Higher order differential attack of Camellia (Ⅱ), Selected Areas in Cryptography-SAC'02, Berlin: Springer-Verlag, 2002, 39-56.
  • 4[4]Lee, S., Hong, S., Lim, J. et al., Truncated differential cryptanalysis of Camellia, ICISC2001, Berlin:Springer-Verlag, 1993, 32-38.
  • 5[5]Sugita, M., Kobara, K., Imai, H., Security of reduced version of the block cipher Camellia against truncated and impossible differential cryptanalysis, Asiacrypt'01, Berlin: Springer-Verlag, 2001, 193-207.
  • 6[6]Shirai, T., Kanamaru, S., Abe, G., Improved upper bounds of differential and linear characteristic probability for Camellia, Fast Software Encryption-FSE'02, Berlin: Springer-Verlag, 2002,128- 142.
  • 7[7]He Yeping, Qing Sihan, Square attack on reduced Camellia cipher, ICICS2001, Berlin: Springer-Verlag, 2001,238-245.
  • 8[8]Yeom, Y., Park, S., Kim, I., On the security of Camellia against the square attack, Fast Software Encryption-FSE'02, Berlin: Springer-Verlag, 2002, 89-99.
  • 9[9]Yeom, Y., Park, S., Kim, I., A study of Integral type cryptanalysis on Camellia, The 2003 Symposium on Cryptography and Security -SCS'03, Hamamatsu, Japan, 2003, 26-29.

共引文献6

同被引文献17

  • 1刘景美,韦宝典,王新梅.Rijndael S-box仿射运算研究[J].西安电子科技大学学报,2005,32(1):94-97. 被引量:4
  • 2Daemen J, Rijmen V. The block cipher square[C]// Proceedings of Fast Software Eneryption'97. Berlin: Springer-Verlag, 1997, 1 267: 149-165.
  • 3Biham E, Keller N. Cryptanalysis of reduced variants of Rijndael [C/OL] // Official Public Comment for Round 2 of the AES Development Effort (2000). [2000-04-08] http: //csrc. nist. gov/encryption/aes/ round2/conf3/aes3papers, html.
  • 4Cheon J, Kim M, Kim K, et al. Improved impossible differential cryptanalysis of Rijndael and crypton [C]//Proceeding of ICICS' 2001. Berlin: Springer Verlag, 2002, 2 288:39-49.
  • 5Phan W. Impossible differential cryptanalysis of 7- round advanced encryption standard[J]. Information Processing Letters, 2004, 91(1): 33-38.
  • 6Biham E, Dunkelman O, Keller N. Related-key impossible differential attacks on 8-round AES-192 [C]//Proceeding of CT-RSA 2006. Berlin: Springer- Verlag, 2006, 3 860: 21-33.
  • 7Zhang Went ao, Wu Wenling, Feng Dengguo. New results on impossible differential eryptanalysis of reduced AES[C]// Proceeding of ICICS' 2007. Berlin: Springer-Verlag, 2007, 4 817: 239-250.
  • 8Biryukov A. The boomerang attack on 5 and 6- round reduced AES[C]//AES 2004. Heidelberg Springer, 2005, 3 373:11-15.
  • 9刘景美,赵林森,王静,王新梅.确定RijndaelS盒布尔函数的等价方法[J].华中科技大学学报(自然科学版),2010,38(1):58-60. 被引量:1
  • 10伊文坛,田亚,陈少真.减缩轮PRIDE算法的线性分析[J].电子学报,2017,45(2):468-476. 被引量:3

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部