Improved preimage attacks on hash modes of 8-round AES-256

被引:0
|
作者
Deukjo Hong
Dong-Chan Kim
Daesung Kwon
Jongsung Kim
机构
[1] Attached Institute of ETRI,Department of Mathematics & Department of Financial Information Security (BK21 Plus Future Financial Information Security Specialist Education Group)
[2] Kookmin University,undefined
来源
关键词
Preimage attack; Hash modes; AES;
D O I
暂无
中图分类号
学科分类号
摘要
We observe the slow diffusion of the AES key schedule for 256-bit keys and find weakness which can be used in the preimage attack on its Davies-Meyer mode. Our preimage attack works for 8 rounds of AES-256 with the computational complexity of 2124.9. It is comparable with Bogdanov et al.’s biclique-based preimage attack on AES-256, which is applicable up to full rounds but has the computational complexity more than 2126.5. We also extend our result to the preimage attack on some well-known double-block-length hash modes assuming the underlying block cipher is 8-round AES-256, whose computational complexity is 2252.9.
引用
收藏
页码:14525 / 14539
页数:14
相关论文
共 50 条
  • [1] Improved preimage attacks on hash modes of 8-round AES-256
    Hong, Deukjo
    Kim, Dong-Chan
    Kwon, Daesung
    Kim, Jongsung
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (22) : 14525 - 14539
  • [2] Improved Single-Key Attacks on 8-Round AES-192 and AES-256
    Dunkelman, Orr
    Keller, Nathan
    Shamir, Adi
    JOURNAL OF CRYPTOLOGY, 2015, 28 (03) : 397 - 422
  • [3] Improved Single-Key Attacks on 8-Round AES-192 and AES-256
    Orr Dunkelman
    Nathan Keller
    Adi Shamir
    Journal of Cryptology, 2015, 28 : 397 - 422
  • [4] Improved Single-Key Attacks on 8-Round AES-192 and AES-256
    Dunkelman, Orr
    Keller, Nathan
    Shamir, Adi
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 158 - 176
  • [5] Meet-in-the-middle attacks on 10-round AES-256
    Rongjia Li
    Chenhui Jin
    Designs, Codes and Cryptography, 2016, 80 : 459 - 471
  • [6] Meet-in-the-middle attacks on 10-round AES-256
    Li, Rongjia
    Jin, Chenhui
    DESIGNS CODES AND CRYPTOGRAPHY, 2016, 80 (03) : 459 - 471
  • [7] Improved Quantum Rebound Attacks on Double Block Length Hashing with Round-Reduced AES-256 and ARIA-256
    Lee, Dongjae
    Hong, Seokhie
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (03) : 238 - 265
  • [8] Related-key impossible differential attacks on reduced-round AES-256
    State Key Laboratory of Information Security, Graduate University, Chinese Acad. of Sci., Beijing 100049, China
    不详
    Ruan Jian Xue Bao, 2007, 11 (2893-2901):
  • [9] Preimage and pseudo collision attacks on round-reduced DHA-256 hash function
    Zou, Jian
    Wu, Wen-Ling
    Wu, Shuang
    Dong, Le
    Tongxin Xuebao/Journal on Communications, 2013, 34 (06): : 8 - 15
  • [10] Improved Preimage Attacks on 4-Round Keccak-224/256
    He, Le
    Lin, Xiaoen
    Yu, Hongbo
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021, 2021 (01) : 217 - 238