Improving the Biclique Cryptanalysis of AES

作者: Biaoshuai Tao , Hongjun Wu

DOI: 10.1007/978-3-319-19962-7_3

关键词:

摘要: Biclique attack is currently the only key-recovery on full AES with a single key. Bogdanov et al. applied it to all three versions of by constructing bicliques size \(2^8\times 2^8\) and reducing number S-boxes computed in matching phase. Their results were improved later better selections differential characteristics biclique construction. In this paper, we improve increasing \(2^{16}\times 2^{16}\). We have each following versions: AES-128 time complexity \(2^{126.13}\) data \(2^{56}\), AES-128 \(2^{126.01}\) \(2^{72}\), AES-192 \(2^{189.91}\) \(2^{48}\), and AES-256 \(2^{254.27}\) \(2^{40}\).

参考文章(26)
Goce Jakimoski, Yvo Desmedt, Related-Key Differential Cryptanalysis of 192-bit Key AES Variants Selected Areas in Cryptography. ,vol. 3006, pp. 208- 221 ,(2004) , 10.1007/978-3-540-24654-1_15
Leibo Li, Keting Jia, Xiaoyun Wang, Improved Single-Key Attacks on 9-Round AES-192/256 Fast Software Encryption. pp. 127- 146 ,(2015) , 10.1007/978-3-662-46706-0_7
Dmitry Khovratovich, Gaëtan Leurent, Christian Rechberger, Narrow-Bicliques: Cryptanalysis of Full IDEA Advances in Cryptology – EUROCRYPT 2012. ,vol. 7237, pp. 392- 410 ,(2012) , 10.1007/978-3-642-29011-4_24
Yanfeng Wang, Wenling Wu, Xiaoli Yu, Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher Information Security Practice and Experience. pp. 337- 352 ,(2012) , 10.1007/978-3-642-29101-2_23
Mustafa Çoban, Ferhat Karakoç, Özkan Boztaş, Biclique Cryptanalysis of TWINE cryptology and network security. pp. 43- 55 ,(2012) , 10.1007/978-3-642-35404-5_5
Anne Canteaut, María Naya-Plasencia, Bastien Vayssière, Sieve-in-the-Middle: Improved MITM Attacks international cryptology conference. ,vol. 8042, pp. 222- 240 ,(2013) , 10.1007/978-3-642-40041-4_13
Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel, A Framework for Automated Independent-Biclique Cryptanalysis Fast Software Encryption. pp. 561- 581 ,(2014) , 10.1007/978-3-662-43933-3_29
Deukjo Hong, Bonwook Koo, Daesung Kwon, Biclique Attack on the Full HIGHT Information Security and Cryptology - ICISC 2011. pp. 365- 374 ,(2012) , 10.1007/978-3-642-31912-9_24
Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir, Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds theory and application of cryptographic techniques. pp. 299- 319 ,(2010) , 10.1007/978-3-642-13190-5_15
Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger, Biclique cryptanalysis of the full AES international conference on the theory and application of cryptology and information security. ,vol. 7073, pp. 344- 371 ,(2011) , 10.1007/978-3-642-25385-0_19