Article (Scientific journals)
Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware
Biryukov, Alex; Groszschädl, Johann
2012In Fundamenta Informaticae, 114 (3-4), p. 221-237
Peer Reviewed verified by ORBi
 

Files


Full Text
FI2012.pdf
Publisher postprint (161.05 kB)
Download

All documents in ORBilu are protected by a user license.

Send to



Details



Keywords :
Advanced Enryption Standard; Cryptanalysis; Cryptanalytic Hardware; Graphics Processing Unit; Energy Evaluation
Abstract :
[en] The block cipher Rijndael has undergone more than ten years of extensive cryptanalysis since its submission as a candidate for the Advanced Encryption Standard (AES) in April 1998. To date, most of the publicly-known cryptanalytic results are based on reduced-round variants of the AES (respectively Rijndael) algorithm. Among the few exceptions that target the full AES are the Related-Key Cryptanalysis (RKC) introduced at ASIACRYPT 2009 and attacks exploiting Time-Memory-Key (TMK) trade-offs such as demonstrated at SAC 2005. However, all these attacks are generally considered infeasible in practice due to their high complexity (i.e. 2^99.5 AES operations for RKC, 2^80 for TMK). In this paper, we evaluate the cost of cryptanalytic attacks on the full AES when using special-purpose hardware in the form of multi-core AES processors that are designed in a similar way as modern Graphics Processing Units (GPUs) such as the NVIDIA GT200b. Using today's VLSI technology would allow for the implementation of a GPU-like processor reaching a throughput of up to 10^12 AES operations per second. An organization able to spend one trillion US$ for designing and building a supercomputer based on such processors could theoretically break the full AES in a time frame of as little as one year when using RKC, or in merely one month when performing a TMK attack. We also analyze different time-cost trade-offs and assess the implications of progress in VLSI technology under the assumption that Moore's law will continue to hold for the next ten years. These assessments raise some concerns about the long-term security of the AES.
Disciplines :
Computer science
Identifiers :
UNILU:UL-ARTICLE-2012-1287
Author, co-author :
Biryukov, Alex ;  University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Groszschädl, Johann ;  University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
External co-authors :
no
Language :
English
Title :
Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware
Publication date :
April 2012
Journal title :
Fundamenta Informaticae
ISSN :
0169-2968
Publisher :
IOS Press
Volume :
114
Issue :
3-4
Pages :
221-237
Peer reviewed :
Peer Reviewed verified by ORBi
Name of the research project :
F1R-CSC-PUL-11SAMD > SAMDES > > BIRYUKOV Alex
Available on ORBilu :
since 26 June 2014

Statistics


Number of views
181 (6 by Unilu)
Number of downloads
170 (1 by Unilu)

Scopus citations®
 
16
Scopus citations®
without self-citations
16
WoS citations
 
13

Bibliography


Similar publications



Contact ORBilu