Bicliques with Minimal Data and Time Complexity for AES

作者: Andrey Bogdanov , Donghoon Chang , Mohona Ghosh , Somitra Kumar Sanadhya

DOI: 10.1007/978-3-319-15943-0_10

关键词:

摘要: In this paper, we re-evaluate the security-bound of full round AES against biclique attack. Under some reasonable restrictions, exhaustively analyze most promising class cryptanalysis as applied to through a computer-assisted search and find optimal attacks towards lowest computational data complexities: Among with minimal complexity unicity distance, ones \(2^{126.67}\) (for AES-128), \(2^{190.9}\) AES-192) \(2^{255}\) AES-256) are fastest. Each attack just requires 2 AES-128 or 3 known plaintexts for success probability 1. We obtain these results using improved proposed in Crypto’13. Among less than codebook, AES-128, \(2^{126.16}\) Within these, one \(2^{64}\) smallest amount data. Thus, original (with \(2^{88}\)) did not have AES-128. Similar findings observed AES-192 well (data \(2^{48}\) \(2^{80}\) attack). For AES-256, an that has lower \(2^{254.31}\) compared \(2^{254.42}\). Among all covered, \(2^{125.56}\) \(2^{189.51}\) \(2^{253.87}\) fastest, though requiring codebook. This can be considered indication limitations independent approach AES.

参考文章(24)
Dmitry Khovratovich, Gaëtan Leurent, Christian Rechberger, Narrow-Bicliques: Cryptanalysis of Full IDEA Advances in Cryptology – EUROCRYPT 2012. ,vol. 7237, pp. 392- 410 ,(2012) , 10.1007/978-3-642-29011-4_24
Charles Bouillaguet, Patrick Derbez, Pierre-Alain Fouque, Automatic search of attacks on round-reduced AES and applications international cryptology conference. ,vol. 2012, pp. 169- 187 ,(2011) , 10.1007/978-3-642-22792-9_10
Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel, A Framework for Automated Independent-Biclique Cryptanalysis Fast Software Encryption. pp. 561- 581 ,(2014) , 10.1007/978-3-662-43933-3_29
Andrey Bogdanov, Christian Rechberger, A 3-subset meet-in-the-middle attack: cryptanalysis of the lightweight block cipher KTANTAN international conference on selected areas in cryptography. ,vol. 6544, pp. 229- 240 ,(2010) , 10.1007/978-3-642-19574-7_16
Aggelos Kiayias, Moti Yung, Polynomial reconstruction based cryptography selected areas in cryptography. pp. 129- 133 ,(2001) , 10.1007/3-540-45537-X_10
Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger, Biclique cryptanalysis of the full AES international conference on the theory and application of cryptology and information security. ,vol. 7073, pp. 344- 371 ,(2011) , 10.1007/978-3-642-25385-0_19
Jan-Hendrik Evertse, David Chaum, Crytanalysis of DES with a Reduced Number of Rounds: Sequences of Linear Factors in Block Ciphers international cryptology conference. pp. 192- 211 ,(1985)
Carolyn Whitnall, Elisabeth Oswald, A comprehensive evaluation of mutual information analysis using a fair evaluation framework international cryptology conference. ,vol. 2011, pp. 316- 334 ,(2011) , 10.1007/978-3-642-22792-9_18
Yu Sasaki, Kazumaro Aoki, Finding Preimages in Full MD5 Faster Than Exhaustive Search international cryptology conference. pp. 134- 152 ,(2009) , 10.1007/978-3-642-01001-9_8
Kazumaro Aoki, Yu Sasaki, Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1 international cryptology conference. pp. 70- 89 ,(2009) , 10.1007/978-3-642-03356-8_5