Interpolation attack method of round-reduced AES

被引:0
|
作者
School of Computer Science and Engineering, South China University of Technology, Guangzhou 510640, China [1 ]
不详 [2 ]
机构
来源
Huanan Ligong Daxue Xuebao | 2008年 / 5卷 / 53-57+64期
关键词
Interpolation - Data privacy;
D O I
暂无
中图分类号
O24 [计算数学];
学科分类号
070102 ;
摘要
Due to the property that the 3-round Advanced Encryption Standard (AES) ciphertexts have a polynomial expression with a low degree of less than 255, a method of interpolation attack on the round-reduced AES is presented, that is, through the Lagrange interpolation formula, the polynomial with 254 degrees can be obtained using 255 values. The algebraic representation of the AES on its plaintexts and ciphertexts is then studied, and the relevant results and the corresponding proofs are also given. According to the proposed attack method, the key of 4-round AES cipher is found using only 2 chosen plaintexts, and the key of 5-round AES cipher is successfully broken using 2 chosen plaintexts. Moreover, this attack method can be extended to the 6-round AES cipher.
引用
收藏
页码:53 / 57
相关论文
共 50 条
  • [1] Partial Sum Attack on Round-Reduced AES Utilizing Parallel Computation Approaches
    Debranjan Pal
    Ankit Gupta
    Abhijit Das
    Dipanwita Roy Chowdhury
    SN Computer Science, 6 (3)
  • [2] Improved Differential Attack on Round-Reduced LEA
    Zhang, Yuhan
    Wu, Wenling
    Zhang, Lei
    INFORMATION SECURITY AND PRIVACY, ACISP 2022, 2022, 13494 : 67 - 84
  • [3] Probabilistic Mixture Differential Cryptanalysis on Round-Reduced AES
    Grassi, Lorenzo
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2019, 2020, 11959 : 53 - 84
  • [4] A New Mixture Differential Cryptanalysis on Round-Reduced AES
    Qiao, Kexin
    Cheng, Junjie
    Ou, Changhai
    MATHEMATICS, 2022, 10 (24)
  • [5] Differential Analysis of Round-Reduced AES Faulty Ciphertexts
    Mirbaha, Amir-Pasha
    Dutertre, Jean-Max
    Tria, Assia
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFTS), 2013, : 204 - 211
  • [6] Automatic Search of Attacks on Round-Reduced AES and Applications
    Bouillaguet, Charles
    Derbez, Patrick
    Fouque, Pierre-Alain
    ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 169 - 187
  • [7] Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff
    Zhou, Haibo
    Zong, Rui
    Dong, Xiaoyang
    Jia, Keting
    Meier, Willi
    COMPUTER JOURNAL, 2021, 64 (04): : 628 - 638
  • [8] Faster Key Recovery Attack on Round-Reduced PRINCE
    Rasoolzadeh, Shahram
    Raddum, Havard
    LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY AND PRIVACY, 2017, 10098 : 3 - 17
  • [9] Differential Fault Analysis for Round-Reduced AES by Fault Injection
    Park, JeaHoon
    Moon, SangJae
    Choi, DooHo
    Kang, YouSung
    Ha, JaeCheol
    ETRI JOURNAL, 2011, 33 (03) : 434 - 442
  • [10] Conditional cube attack on round-reduced River Keyak
    Bi, Wenquan
    Li, Zheng
    Dong, Xiaoyang
    Li, Lu
    Wang, Xiaoyun
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (06) : 1295 - 1310