2011
DOI: 10.1007/978-3-642-22792-9_10
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Search of Attacks on Round-Reduced AES and Applications

Abstract: Abstract. In this paper, we describe versatile and powerful algorithms for searching guess-and-determine and meet-in-the-middle attacks on byte-oriented symmetric primitives. To demonstrate the strengh of these tool, we show that they allows to automatically discover new attacks on round-reduced AES with very low data complexity, and to find improved attacks on the AES-based MACs Alpha-MAC and Pelican-MAC, and also on the AES-based stream cipher LEX. Finally, the tools can be used in the context of fault attac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
83
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 68 publications
(83 citation statements)
references
References 26 publications
0
83
0
Order By: Relevance
“…Consequently, the input and output of the AddRoundKey operation are known, which determines the four bytes of k. In the end, we find the 2 16 solutions of Problem 1 in time 2 16 operations. To apply this strategy to the 8-round truncated differential characteristic of Figure 9, we start by randomizing the difference ∆y 2 , the difference ∆w 5 and the values in the first column of w 5 . Due to the linear operations involved, we deduce ∆x 3 = ∆w 2 from ∆y 2 and ∆y 4 from ∆w 4 .…”
Section: Distinguisher For 8-round Aes-128mentioning
confidence: 99%
See 4 more Smart Citations
“…Consequently, the input and output of the AddRoundKey operation are known, which determines the four bytes of k. In the end, we find the 2 16 solutions of Problem 1 in time 2 16 operations. To apply this strategy to the 8-round truncated differential characteristic of Figure 9, we start by randomizing the difference ∆y 2 , the difference ∆w 5 and the values in the first column of w 5 . Due to the linear operations involved, we deduce ∆x 3 = ∆w 2 from ∆y 2 and ∆y 4 from ∆w 4 .…”
Section: Distinguisher For 8-round Aes-128mentioning
confidence: 99%
“…We continue by observing that the randomization of the bytes in w 4 actually sets the value of two diagonal bytes in k 5 , k 5 [0] and k 5 [5], which imposes constraints of the elements in the lists L i . We start by considering the 2 16 elements of L 3 , and for each of them, we .…”
Section: Distinguisher For 8-round Aes-128mentioning
confidence: 99%
See 3 more Smart Citations