Interpolation attack method of round-reduced AES

被引:0
|
作者
School of Computer Science and Engineering, South China University of Technology, Guangzhou 510640, China [1 ]
不详 [2 ]
机构
来源
Huanan Ligong Daxue Xuebao | 2008年 / 5卷 / 53-57+64期
关键词
Interpolation - Data privacy;
D O I
暂无
中图分类号
O24 [计算数学];
学科分类号
070102 ;
摘要
Due to the property that the 3-round Advanced Encryption Standard (AES) ciphertexts have a polynomial expression with a low degree of less than 255, a method of interpolation attack on the round-reduced AES is presented, that is, through the Lagrange interpolation formula, the polynomial with 254 degrees can be obtained using 255 values. The algebraic representation of the AES on its plaintexts and ciphertexts is then studied, and the relevant results and the corresponding proofs are also given. According to the proposed attack method, the key of 4-round AES cipher is found using only 2 chosen plaintexts, and the key of 5-round AES cipher is successfully broken using 2 chosen plaintexts. Moreover, this attack method can be extended to the 6-round AES cipher.
引用
收藏
页码:53 / 57
相关论文
共 50 条
  • [41] Differential Cryptanalysis of Round-Reduced LEA
    Dwivedi, Ashutosh Dhar
    Srivastava, Gautam
    IEEE ACCESS, 2018, 6 : 79105 - 79113
  • [42] New Key-Recovery Attack on Reduced-Round AES
    Bardeh, Navid Ghaedi
    Rijmen, Vincent
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2022, 2022 (02) : 43 - 62
  • [43] Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64
    Lyu, Lijun
    Tu, Yi
    Zhang, Yingjie
    INFORMATION SECURITY, ISC 2022, 2022, 13640 : 443 - 463
  • [44] Improved Differential-Linear Attack with Application to Round-Reduced Speck32/64
    Wang, Feifan
    Wang, Gaoli
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2022, 2022, 13269 : 792 - 808
  • [45] Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM
    Dwivedi, Ashutosh Dhar
    Dhar, Shalini
    Srivastava, Gautam
    Singh, Rajani
    CRYPTOGRAPHY, 2019, 3 (01) : 1 - 11
  • [46] Cryptanalysis of the Round-Reduced GOST Hash Function
    Zou, Jian
    Wu, Wenling
    Wu, Shuang
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 309 - 322
  • [47] Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
    Dinur, Itai
    Morawiecki, Pawel
    Pieprzyk, Josef
    Srebrny, Marian
    Straus, Michal
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 : 733 - 761
  • [48] Improved Linear Hull Attack on Round-Reduced SIMON with Dynamic Key-Guessing Techniques
    Chen, Huaifeng
    Wang, Xiaoyun
    FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 428 - 449
  • [49] INTEGRAL CRYPTANALYSIS OF ROUND-REDUCED PRINCE CIPHER
    Posteuca, Raluca
    Negara, Gabriel
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2015, 16 : 265 - 269
  • [50] Cube attacks on round-reduced MORUS and Gimli
    Siwei Chen
    Zejun Xiang
    Xiangyong Zeng
    Shasha Zhang
    Science China Information Sciences, 2022, 65