Interpolation attack method of round-reduced AES

被引:0
|
作者
School of Computer Science and Engineering, South China University of Technology, Guangzhou 510640, China [1 ]
不详 [2 ]
机构
来源
Huanan Ligong Daxue Xuebao | 2008年 / 5卷 / 53-57+64期
关键词
Interpolation - Data privacy;
D O I
暂无
中图分类号
O24 [计算数学];
学科分类号
070102 ;
摘要
Due to the property that the 3-round Advanced Encryption Standard (AES) ciphertexts have a polynomial expression with a low degree of less than 255, a method of interpolation attack on the round-reduced AES is presented, that is, through the Lagrange interpolation formula, the polynomial with 254 degrees can be obtained using 255 values. The algebraic representation of the AES on its plaintexts and ciphertexts is then studied, and the relevant results and the corresponding proofs are also given. According to the proposed attack method, the key of 4-round AES cipher is found using only 2 chosen plaintexts, and the key of 5-round AES cipher is successfully broken using 2 chosen plaintexts. Moreover, this attack method can be extended to the 6-round AES cipher.
引用
收藏
页码:53 / 57
相关论文
共 50 条
  • [31] Cube attacks on round-reduced TinyJAMBU
    Teng, Wil Liam
    Salam, Iftekhar
    Yau, Wei-Chuen
    Pieprzyk, Josef
    Phan, Raphael C-W
    SCIENTIFIC REPORTS, 2022, 12 (01)
  • [32] Practical attacks on the round-reduced PRINCE
    Morawiecki, Pawel
    IET INFORMATION SECURITY, 2017, 11 (03) : 146 - 151
  • [33] Algebraic Attacks on Round-Reduced Keccak
    Liu, Fukang
    Isobe, Takanori
    Meier, Willi
    Yang, Zhonghao
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 91 - 110
  • [34] Cube attacks on round-reduced TinyJAMBU
    Wil Liam Teng
    Iftekhar Salam
    Wei-Chuen Yau
    Josef Pieprzyk
    Raphaël C.-W. Phan
    Scientific Reports, 12
  • [35] Related-Key Differential Attack on Round-Reduced Bel-T-256
    Abdelkhalek, Ahmed
    Tolba, Mohamed
    Youssef, Amr M.
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (05) : 859 - 862
  • [36] A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique
    Hao, Yonglin
    Bai, Dongxia
    Li, Leibo
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 166 - 183
  • [37] Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256
    Yu, Hongbo
    Chen, Jiazhe
    Wang, Xiaoyun
    FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 263 - 283
  • [38] Rotational Cryptanalysis of Round-Reduced KECCAK
    Morawiecki, Pawel
    Pieprzyk, Josef
    Srebrny, Marian
    FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 241 - 262
  • [39] Cube Cryptanalysis of Round-Reduced ACORN
    Yang, Jingchun
    Liu, Meicheng
    Lin, Dongdai
    INFORMATION SECURITY, ISC 2019, 2019, 11723 : 44 - 64
  • [40] SMT-based cube attack on round-reduced Simeck32/64
    Zaheri, Mojtaba
    Sadeghiyan, Babak
    IET INFORMATION SECURITY, 2020, 14 (05) : 604 - 611