Interpolation attack method of round-reduced AES

被引:0
|
作者
School of Computer Science and Engineering, South China University of Technology, Guangzhou 510640, China [1 ]
不详 [2 ]
机构
来源
Huanan Ligong Daxue Xuebao | 2008年 / 5卷 / 53-57+64期
关键词
Interpolation - Data privacy;
D O I
暂无
中图分类号
O24 [计算数学];
学科分类号
070102 ;
摘要
Due to the property that the 3-round Advanced Encryption Standard (AES) ciphertexts have a polynomial expression with a low degree of less than 255, a method of interpolation attack on the round-reduced AES is presented, that is, through the Lagrange interpolation formula, the polynomial with 254 degrees can be obtained using 255 values. The algebraic representation of the AES on its plaintexts and ciphertexts is then studied, and the relevant results and the corresponding proofs are also given. According to the proposed attack method, the key of 4-round AES cipher is found using only 2 chosen plaintexts, and the key of 5-round AES cipher is successfully broken using 2 chosen plaintexts. Moreover, this attack method can be extended to the 6-round AES cipher.
引用
收藏
页码:53 / 57
相关论文
共 50 条
  • [21] Cryptanalysis of round-reduced ASCON
    Li, Yanbin
    Zhang, Guoyan
    Wang, Wei
    Wang, Meiqin
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (03)
  • [22] Cryptanalysis of Round-Reduced LED
    Nikolic, Ivica
    Wang, Lei
    Wu, Shuang
    FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 112 - 129
  • [23] Genetic Algorithm Assisted State-Recovery Attack on Round-Reduced Xoodyak
    Zhang, Zimin
    Zhang, Wenying
    Shi, Hongfang
    COMPUTER SECURITY - ESORICS 2021, PT II, 2021, 12973 : 257 - 274
  • [24] Cube-Attack-Like Cryptanalysis of Round-Reduced KECCAK Using MILP
    Song, Ling
    Guo, Jian
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (03) : 182 - 214
  • [25] Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE
    Biryukov, Alex
    Derbez, Patrick
    Perrin, Leo
    FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 3 - 27
  • [26] General Practical Cryptanalysis of the Sum of Round-Reduced Block Ciphers and ZIP-AES
    Florez-Gutierrez, Antonio
    Grassi, Lorenzo
    Leander, Gregor
    Sibleyras, Ferdinand
    Todo, Yosuke
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT IX, 2025, 15492 : 280 - 311
  • [27] Fast Chosen-Key Distinguish Attacks on Round-Reduced AES-192
    Zhu, Chunbo
    Wang, Gaoli
    Zhu, Boyu
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 573 - 587
  • [28] MixColumns Properties and Attacks on (Round-Reduced) AES with a Single Secret S-Box
    Grassi, Lorenzo
    TOPICS IN CRYPTOLOGY - CT-RSA 2018, 2018, 10808 : 243 - 263
  • [29] The boomerang attack on 5 and 6-round reduced AES
    Biryukov, A
    ADVANCED ENCRYPTION STANDARD - AES, 2005, 3373 : 11 - 15
  • [30] The Retracing Boomerang Attack, with Application to Reduced-Round AES
    Dunkelman, Orr
    Keller, Nathan
    Ronen, Eyal
    Shamir, Adi
    JOURNAL OF CRYPTOLOGY, 2024, 37 (03)