ON THE RELATED-KEY ATTACKS AGAINST AES

被引:0
|
作者
Daemen, Joan
Rijmen, Vincent [1 ,2 ]
机构
[1] Graz Univ Technol, A-8010 Graz, Austria
[2] Katholieke Univ Leuven, Louvain, Belgium
关键词
Advanced Encryption Standard; AES; security; related-key attacks;
D O I
暂无
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Alex Biryukov and Dmitry Khovratovich presented related-key attacks on AES and reduced-round versions of AES. The most impressive of these were presented at Asiacrypt 2009: related-key attacks against the full AES-256 and AES-192. We discuss the applicability of these attacks and related-key attacks in general. We model the access of the attacker to the key in the form of key access schemes. Related-key attacks should only be considered with respect to sound key access schemes. We show that defining a sound key access scheme in which the related-key attacks against AES-256 and AES-192 can be conducted, is possible, but contrived.
引用
收藏
页码:395 / 400
页数:6
相关论文
共 50 条
  • [1] AES Variants Secure against Related-Key Differential and Boomerang Attacks
    Choy, Jiali
    Zhang, Aileen
    Khoo, Khoongming
    Henricksen, Matt
    Poschmann, Axel
    INFORMATION SECURITY THEORY AND PRACTICE: SECURITY AND PRIVACY OF MOBILE DEVICES IN WIRELESS COMMUNICATION, 2011, 6633 : 191 - 207
  • [2] New Related-Key Boomerang Attacks on AES
    Gorski, Michael
    Lucks, Stefan
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 266 - 278
  • [3] Ciphers secure against related-key attacks
    Lucks, S
    FAST SOFTWARE ENCRYPTION, 2004, 3017 : 359 - 370
  • [4] Revisiting AES related-key differential attacks with constraint programming
    Gerault, David
    Lafourcade, Pascal
    Minier, Marine
    Solnon, Christine
    INFORMATION PROCESSING LETTERS, 2018, 139 : 24 - 29
  • [5] Related-key rectangle attacks on reduced AES-192 and AES-256
    Kim, Jongsung
    Hong, Seokhie
    Preneel, Bart
    FAST SOFTWARE ENCRYPTION, 2007, 4593 : 225 - +
  • [6] Cryptography Secure against Related-Key Attacks and Tampering
    Bellare, Mihir
    Cash, David
    Miller, Rachel
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 486 - +
  • [7] Anonymous Signcryption against Linear Related-Key Attacks
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 165 - 183
  • [8] Signcryption Secure Against Linear Related-Key Attacks
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    COMPUTER JOURNAL, 2014, 57 (10): : 1472 - 1483
  • [9] New related-key rectangle attacks on reduced AES-192 and AES-256
    WEI YongZhuang HU YuPu Key Laboratory of Computer Networks Information Security of Ministry of EducationXidian UniversityXian China
    Science in China(Series F:Information Sciences), 2009, 52 (04) : 617 - 626
  • [10] New related-key rectangle attacks on reduced AES-192 and AES-256
    YongZhuang Wei
    YuPu Hu
    Science in China Series F: Information Sciences, 2009, 52 : 617 - 626