Reference : Related-Key Cryptanalysis of the Full AES-192 and AES-256
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
http://hdl.handle.net/10993/17079
Related-Key Cryptanalysis of the Full AES-192 and AES-256
English
Biryukov, Alex mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
Khovratovich, Dmitry [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
2009
ASIACRYPT 2009
Springer
1-18
Yes
International
978-3-642-10365-0
ASIACRYPT 2009
December 6-10, 2009
Tokyo
Japan
[en] related-key attacks ; AES ; boomerang
[en] In this paper we present two related-key attacks on the full AES. For AES-256 we show the first key recovery attack that works for all the keys and has 2^99.5 time and data complexity, while the recent attack by Biryukov-Khovratovich-Nikolic works for a weak key class and has much higher complexity. The second attack is the first cryptanalysis of the full AES-192. Both our attacks are boomerang attacks, which are based on the recent idea of finding local collisions in block ciphers and enhanced with the boomerang switching techniques to gain free rounds in the middle.
http://hdl.handle.net/10993/17079
5912
Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
RK-cryptanalysis-AES-256.pdfPublisher postprint382.7 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.