Advertisement

Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Single key recovery attacks on reduced AES-192 and Kalyna-128/256

This is a preview of subscription content, log in to check access.

References

  1. 1

    Demirci H, Selçuk A A. A meet-in-the-middle attack on 8-round AES. In: Fast Software Encyption. Berlin: Springer-Verlag, 2008. 116–126

  2. 2

    Demirci H, Tąskin I, Çoban M, et al. Improved meet-in-the-middle attacks on AES. In: Proceedings of International Conference on Cryptology in India. Berlin: Springer-Verlag, 2009. 144–156

  3. 3

    Dunkelman O, Keller N, Shamir A. Improved singlekey attacks on 8-round AES-192 and AES-256. In: Advances in Cryptology—ASIACRYPT 2010. Berlin: Springer-Verlag, 2010. 158–176

  4. 4

    Derbez P, Fouque P A, Jean J. Improved key recovery attacks on reduced round AES in the single-key setting. In: Advances in Cryptology—EUROCRYPT 2013. Berlin: Springer-Verlag, 2013. 371–187

  5. 5

    Li L B, Jia K T, Wang X Y. Improved single-key attacks on 9-round AES-192/256. In: Fast Software Encyption. Berlin: Springer-Verlag, 2015. 127–146

  6. 6

    Li R J, Jin C H. Meet-in-the-middle attacks on 10-round AES-256. Designs Codes Cryptogr, 2015, 80: 459–471

  7. 7

    Huang J L, Lai X J. Revisiting key schedule’s diffusion in relation with round function’s diffusion. Designs Codes Cryptogr, 2014, 73: 85–103

  8. 8

    Li L, Wu W L, Zheng Y F. Automatic search for key-bridging technique: applications to LBlock and TWINE. In: Fast Software Encryption. Berlin: Springer-Verlag, 2016. 247–267

  9. 9

    AlTawy R, Abdelkhalek A, Youssef A M. A meet-in-the-middle attack on reduced-round Kalyna-b/2b. Ieice Trans Inf Syst, 2016, E99.D: 1246–1250

  10. 10

    Akshima, Chang D H, Ghosh M, et al. Single key recovery attacks on 9-round Kalyna-128/256 and Kalyna-256/512. In: Information Security and Cryptology—ICISC 2015. Berlin: Springer-Verlag, 2015. 119–135

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. 61572125, 61373142), High Technology Field of “Action Plan for Scientific and Technological Innovation” in Shanghai (Grant No. 16511101400).

Author information

Correspondence to Gaoli Wang.

Additional information

The authors declare that they have no conflict of interest.

Electronic supplementary material

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Wang, G., Zhu, C. Single key recovery attacks on reduced AES-192 and Kalyna-128/256. Sci. China Inf. Sci. 60, 099101 (2017). https://doi.org/10.1007/s11432-016-0417-7

Download citation