Improved preimage attacks on hash modes of 8-round AES-256

被引:0
|
作者
Deukjo Hong
Dong-Chan Kim
Daesung Kwon
Jongsung Kim
机构
[1] Attached Institute of ETRI,Department of Mathematics & Department of Financial Information Security (BK21 Plus Future Financial Information Security Specialist Education Group)
[2] Kookmin University,undefined
来源
关键词
Preimage attack; Hash modes; AES;
D O I
暂无
中图分类号
学科分类号
摘要
We observe the slow diffusion of the AES key schedule for 256-bit keys and find weakness which can be used in the preimage attack on its Davies-Meyer mode. Our preimage attack works for 8 rounds of AES-256 with the computational complexity of 2124.9. It is comparable with Bogdanov et al.’s biclique-based preimage attack on AES-256, which is applicable up to full rounds but has the computational complexity more than 2126.5. We also extend our result to the preimage attack on some well-known double-block-length hash modes assuming the underlying block cipher is 8-round AES-256, whose computational complexity is 2252.9.
引用
收藏
页码:14525 / 14539
页数:14
相关论文
共 50 条
  • [21] New related-key rectangle attacks on reduced AES-192 and AES-256
    WEI YongZhuang & HU YuPu Key Laboratory of Computer Networks & Information Security of Ministry of Education
    Science China(Information Sciences), 2009, (04) : 617 - 626
  • [22] New related-key rectangle attacks on reduced AES-192 and AES-256
    YongZhuang Wei
    YuPu Hu
    Science in China Series F: Information Sciences, 2009, 52 : 617 - 626
  • [23] New related-key rectangle attacks on reduced AES-192 and AES-256
    WEI YongZhuang HU YuPu Key Laboratory of Computer Networks Information Security of Ministry of EducationXidian UniversityXian China
    Science in China(Series F:Information Sciences), 2009, 52 (04) : 617 - 626
  • [24] Quantum Free-Start Collision Attacks on Double Block Length Hashing with Round-Reduced AES-256
    Chauhan, Amit Kumar
    Kumar, Abhishek
    Sanadhya, Somitra Kumar
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021, 2021 (01) : 316 - 336
  • [25] Impossible Differential Cryptanalysis of 8-Round Deoxys-BC-256
    Jiang, Zilong
    Jin, Chenhui
    IEEE ACCESS, 2018, 6 : 8890 - 8895
  • [26] A Security Comparison between AES-128 and AES-256 FPGA implementations against DPA attacks
    Zuniga Gonzalez, Virginia
    Tena-Sanchez, Erica
    Acosta, Antonio J.
    2023 38TH CONFERENCE ON DESIGN OF CIRCUITS AND INTEGRATED SYSTEMS, DCIS, 2023,
  • [27] Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grostl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions
    Ma, Bingke
    Li, Bao
    Hao, Ronglin
    Li, Xiaoqian
    ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 79 - 96
  • [28] Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
    Biryukov, Alex
    Dunkelman, Orr
    Keller, Nathan
    Khovratovich, Dmitry
    Shamir, Adi
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 299 - +
  • [29] Improved Single-Key Attacks on 9-Round AES-192/256
    Li, Leibo
    Jia, Keting
    Wang, Xiaoyun
    FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 : 127 - 146
  • [30] Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function
    Zou, Jian
    Wu, Wenling
    Wu, Shuang
    Dong, Le
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2014, 30 (06) : 1789 - 1806