Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities

被引:30
|
作者
Bar-On, Achiya [1 ]
Dunkelman, Orr [2 ]
Keller, Nathan [1 ]
Ronen, Eyal [3 ]
Shamir, Adi [3 ]
机构
[1] Bar Ilan Univ, Dept Math, Ramat Gan, Israel
[2] Univ Haifa, Comp Sci Dept, Haifa, Israel
[3] Weizmann Inst Sci, Comp Sci Dept, Rehovot, Israel
来源
基金
欧洲研究理事会;
关键词
EFFICIENT; SEARCH;
D O I
10.1007/978-3-319-96881-0_7
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Determining the security of AES is a central problem in cryptanalysis, but progress in this area had been slow and only a handful of cryptanalytic techniques led to significant advancements. At Euro-crypt 2017 Grassi et al. presented a novel type of distinguisher for AES-like structures, but so far all the published attacks which were based on this distinguisher were inferior to previously known attacks in their complexity. In this paper we combine the technique of Grassi et al. with several other techniques to obtain the best known key recovery attack on 5-round AES in the single-key model, reducing its overall complexity from about 2(32) to about 2(22.5). Extending our techniques to 7-round AES, we obtain the best known attacks on AES-192 which use practical amounts of data and memory, breaking the record for such attacks which was obtained 18 years ago by the classical Square attack.
引用
收藏
页码:185 / 212
页数:28
相关论文
共 50 条
  • [21] Improved meet-in-the-middle attacks on reduced-round Piccolo
    Ya LIU
    Liang CHENG
    Zhiqiang LIU
    Wei LI
    Qingju WANG
    Dawu GU
    ScienceChina(InformationSciences), 2018, 61 (03) : 95 - 107
  • [22] Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi
    Hoki, Jin
    Isobe, Takanori
    Ito, Ryoma
    Liu, Fukang
    Sakamoto, Kosei
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 65
  • [23] Improved meet-in-the-middle attacks on reduced-round Piccolo
    Liu, Ya
    Cheng, Liang
    Liu, Zhiqiang
    Li, Wei
    Wang, Qingju
    Gu, Dawu
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
  • [24] Improved Collision Attacks on the Reduced-Round Grostl Hash Function
    Ideguchi, Kota
    Tischhauser, Elmar
    Preneel, Bart
    INFORMATION SECURITY, 2011, 6531 : 1 - 16
  • [25] Improved meet-in-the-middle attacks on reduced-round DES
    Dunkelman, Orr
    Sekar, Gautharn
    Preneel, Bart
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 86 - 100
  • [26] Improved meet-in-the-middle attacks on reduced-round Piccolo
    Ya Liu
    Liang Cheng
    Zhiqiang Liu
    Wei Li
    Qingju Wang
    Dawu Gu
    Science China Information Sciences, 2018, 61
  • [27] Key-Recovery Attack on Reduced-Round AES-128 Using the Exchange-Equivalence
    Zhang L.
    Wu W.
    Zhang L.
    Zheng Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2213 - 2221
  • [28] Gain: Practical Key-Recovery Attacks on Round-Reduced PAEQ
    Dhiman Saha
    Sourya Kakarla
    Srinath Mandava
    Dipanwita Roy Chowdhury
    Journal of Hardware and Systems Security, 2017, 1 (3) : 282 - 296
  • [29] Preimage Attacks on Reduced-Round Stribog
    AlTawy, Riham
    Youssef, Amr M.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 109 - 125
  • [30] Quantum Demiric-Selcuk Meet-in-the-Middle Attacks on Reduced-Round AES
    Ping Wang
    Xiaomei Chen
    Guohao Jiang
    International Journal of Theoretical Physics, 2022, 61