Filters








63,098 Hits in 3.6 sec

IMPOSSIBLE DIFFERENTIAL CRYPTANALYSIS OF MINI-AES

Raphael Chung-Wei Phan
2003 Cryptologia  
Impossible differential cryptanalysis is one of the cryptanalysis methods that are applicable to the new Advanced Encryption Standard (AES).  ...  In this paper, we present an introduction to the method by applying it on Mini-AES, the mini version of the AES published in Cryptologia recently.  ...  A 4-round Impossible Differential of Mini-AES Mini-AES has only 2 rounds [3], which makes it too trivial for an impossible differential attack, so we will consider more rounds of Mini-AES.  ... 
doi:10.1080/0161-110391891964 fatcat:t2etfwohwnfmhd6knqu4dt2oa4

Linear and differential cryptanalysis of reduced-round AES

Lucia Lacko-Bartošová
2011 Tatra Mountains Mathematical Publications  
The subject of this paper is linear and differential cryptanalysis of two rounds of the Advanced Encryption Standard (AES) with estimation of com- plexity for three-round AES attack.  ...  Minimal complexity of linear attack on three-round AES is bigger than d × 260, where d is a small constant.  ...  Figure 1 . 1 Linear cryptanalysis of two-round AES, c=4. Figure 2 . 2 Differential cryptanalysis of two-round AES, c=8. In the final round, step MixColumns is removed.  ... 
doi:10.2478/v10127-011-0036-y fatcat:6qjt57z6a5eqnda6bpncuyofdi

AES Variants Secure against Related-Key Differential and Boomerang Attacks [chapter]

Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann
2011 Lecture Notes in Computer Science  
In this paper, we present a framework for protection against the recent related-key differential and boomerang attacks on AES by Biryukov et al.  ...  s key schedule is not on-the-fly (which is a requirement for some hardware implementations), we propose an on-the-fly AES key schedule that is resistant against related-key differential and boomerang attacks  ...  These proposed key schedules for AES-192 and AES-256 are partially irreversible, by which we mean that, given two round keys, it is hard to derive the rest of the round keys.  ... 
doi:10.1007/978-3-642-21040-2_13 fatcat:uelij64f4be2bl3rtafjeapsru

Efficient constructions for large‐state block ciphers based on AES New Instructions

Rentaro Shiba, Kosei Sakamoto, Takanori Isobe
2021 IET Information Security  
As a result, the authors reveal the constructions such that two rounds of the AES round function is executed in parallel at each step and its outputs are shuffled (called two-round constructions) and are  ...  In Haraka-v2 and Pholkos, the AES round function is executed twice in parallel at each step and its outputs are shuffled (called two-round constructions).  ...  function in one step and two-round construction that uses two AES round functions in one step.  ... 
doi:10.1049/ise2.12053 fatcat:mzqzh7yvkvenvgnzy75dfctklm

A method for fault recognition in the last three rounds of Advanced Encryption Standard

Huilong Jiang, Xiang Zhu, Jinfeng Pang, Zhipeng Liu, Jianwei Han, Yue Li
2021 Electronics Letters  
For the fault induced in eighth round, the fault value can be obtained with 188.5 ciphertexts by analyzing the differential features of two Sboxes and MixColumns.  ...  Generally, fault can be induced in the last three rounds of AES, and each round has its own fault analysis model respectively [4] .  ...  Two ciphertext pairs can be used to distinguish those two kinds of faults: if the two differentials are equal, we can directly output the fault differential, because the probability that the differentials  ... 
doi:10.1049/ell2.12188 fatcat:qey4emtm65bihgkuf5ysv5qbfy

Impossible Differential Cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES [article]

Wei Wang, Xiaoyun Wang, Guangwu Xu
2009 IACR Cryptology ePrint Archive  
Then the impossible differential attack on 4-round AES is implemented using a 3-round impossible differential property.  ...  In this paper, the impossible differential cryptanalysis is extended to MAC algorithms Pelican, MT-MAC and PC-MAC based on AES and 4-round AES.  ...  Property 1 (Impossible Differential Property of 3-round AES).  ... 
dblp:journals/iacr/WangWX09 fatcat:ygnojgkwpzfbdedaftztknwjg4

The (related-key) impossible boomerang attack and its application to the AES block cipher

Jiqiang Lu
2010 Designs, Codes and Cryptography  
Finally, we apply the impossible boomerang attack to break 6-round AES with 128 key bits and 7-round AES with 192/256 key bits, and using two related keys we apply the related-key impossible boomerang  ...  attack to break 8-round AES with 192 key bits and 9-round AES with 256 key bits.  ...  round AES-192 and 9-round AES-256 in the two-key related-key attack scenario.  ... 
doi:10.1007/s10623-010-9421-9 fatcat:k6fj2orwjvaw5kuh4n6rutfboi

Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function [chapter]

Martin Schläffer
2011 Lecture Notes in Computer Science  
We provide a subspace distinguisher for 5 rounds and collisions for 4 out of 8 rounds of the ECHO-256 hash function.  ...  Near-collisions for 4.5/8 rounds of the hash function and compression function results for 7/8 rounds without chosen salt are given in an extended version of this paper [19] .  ...  SuperBox The SuperBox has first been used by the designers of AES in the differential analysis of two AES rounds [6] .  ... 
doi:10.1007/978-3-642-19574-7_25 fatcat:zfw4jnlcaffb3hoge6bshjnwwm

Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds [chapter]

Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir
2010 Lecture Notes in Computer Science  
One of our attacks uses only two related keys and 2 39 time to recover the complete 256-bit key of a 9-round version of AES-256 (the best previous attack on this variant required 4 related keys and 2 120  ...  We show attacks on reduced-round variants of AES-256 with up to 10 rounds with complexity which is feasible.  ...  Attacks on 10 Round Variants of AES-256 In this section we describe two attacks on the 10-round variant of AES-256.  ... 
doi:10.1007/978-3-642-13190-5_15 fatcat:imjhqrpk6zb6dgsjzgcmtdwfyq

New Key-Recovery Attack on Reduced-Round AES

Navid Ghaedi Bardeh, Vincent Rijmen
2022 IACR Transactions on Symmetric Cryptology  
This results in a new key-recovery attack on 7-round AES which is the first attack on 7-round AES by exploiting the zero-difference property.  ...  A new fundamental 4-round property of AES, called the zero-difference property, was introduced by Rønjom, Bardeh and Helleseth at Asiacrypt 2017.  ...  We describe a new 7-round related-differential characteristic for AES, which embeds 4-round related differentials.  ... 
doi:10.46586/tosc.v2022.i2.43-62 dblp:journals/tosc/BardehR22 fatcat:ynpe3af7wfci3kahjzkhszyage

Subspace Trail Cryptanalysis and its Applications to AES

Lorenzo Grassi, Christian Rechberger, Sondre Rønjom
2017 IACR Transactions on Symmetric Cryptology  
Finally, we show that our impossible differential attack on 5 rounds of AES with secret S-Box can be turned into a distinguisher for AES in the same setting as the one recently proposed by Sun, Liu, Guo  ...  Choosing AES-128 as the perhaps most studied cipher, we describe distinguishers up to 5-round AES with a single unknown key.  ...  Algorithm 4: Attack for 5-round of AES using Impossible Differential -Pseudo Code. Table 3 : 3 Comparison of attacks on round-reduced AES with secret S-Box. full rounds and the final round.  ... 
doi:10.46586/tosc.v2016.i2.192-225 fatcat:7xxvgajoyfhc3cdalrzfxm7j3i

Subspace Trail Cryptanalysis and its Applications to AES

Lorenzo Grassi, Christian Rechberger, Sondre Rønjom
2017 IACR Transactions on Symmetric Cryptology  
Finally, we show that our impossible differential attack on 5 rounds of AES with secret S-Box can be turned into a distinguisher for AES in the same setting as the one recently proposed by Sun, Liu, Guo  ...  Choosing AES-128 as the perhaps most studied cipher, we describe distinguishers up to 5-round AES with a single unknown key.  ...  2 rounds of AES, giving bound on the maximum differential probability.  ... 
doi:10.13154/tosc.v2016.i2.192-225 dblp:journals/tosc/GrassiRR16 fatcat:rm7yye34gvg3dc7s6jpo3hv72e

Plateau characteristics

J. Daemen, V. Rijmen
2007 IET Information Security  
In the case of the AES, for most keys there are two-round characteristics with fixed-key probability equal to 32/2 32 while the Maximum Expected Differential Probability (MEDP) of two-round differentials  ...  In this paper we prove that for a large group of ciphers, including the AES, all two-round characteristics are plateau characteristics.  ...  of two and more rounds of the AES.  ... 
doi:10.1049/iet-ifs:20060099 fatcat:kgtll5hydzgidncpthvzvy3dqm

Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others [chapter]

Alex Biryukov, Ivica Nikolić
2010 Lecture Notes in Computer Science  
We show the best relatedkey differential characteristics for 5, 11, and 14 rounds of AES-128, AES-192, and AES-256 respectively.  ...  We use the optimal differential characteristics to design the best related-key and chosen key attacks on AES-128 (7 out of 10 rounds), AES-192 (full 12 rounds), byte-Camellia (full 18 rounds) and Khazad  ...  In AES-128 there are no 6-round related-key differential characteristics. For AES-192 we found differential characteristics up to 11 rounds out of 12.  ... 
doi:10.1007/978-3-642-13190-5_17 fatcat:iz6eqelxtbbmtg25pjrprvprkq

Data based Transposition to Enhance Data Avalanche and Differential Data Propagation in Advanced Encryption Standard

Paul A.J., Saju A., Lekshmi R. Nair
2013 International Journal of Computer Applications  
In advanced Encryption Standard (AES) the transposition of data is facilitated by shift row and mix column operations. In Matrix Array Symmetric  ...  In symmetric block ciphers, substitution and transposition operations are performed in multiple rounds to transform plaintext blocks into ciphertext blocks.  ...  The differential propagation of data through round outputs in AES and modified AES are presented here.  ... 
doi:10.5120/11445-7039 fatcat:7j7qfmk6dbbktigjshoabgnpjm
« Previous Showing results 1 — 15 out of 63,098 results