Advertisement

Improved Cryptanalysis of Rijndael

  • Niels Ferguson
  • John Kelsey
  • Stefan Lucks
  • Bruce Schneier
  • Mike Stay
  • David Wagner
  • Doug Whiting
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1978)

Abstract

We improve the best attack on Rijndael reduced to 6 rounds from complexity 272 to 244. We also present the first known attacks on 7- and 8-round Rijndael. The attacks on 8-round Rijndael work for 192- bit and 256-bit keys. Finally, we discuss the key schedule of Rijndael and describe a related-key attack that can break 9-round Rijndael with 256-bit keys.

References

  1. Bih93.
    Eli Biham. New types of cryptanalytic attacks using related keys. In Tor Helleseth, editor, Advances in Cryptology-EUROCRYPT '93, volume 765 of Lecture Notes in Computer Science, pages 398–409. Springer-Verlag, 1993.Google Scholar
  2. DBRP99.
    Carl D'Halluin, Gert Bijnens, Vincent Rijmen, and Bart Preneel. Attack on six rounds of Crypton. In Lars Knudsen, editor, Fast Software Encryption’ 99, volume 1636 of Lecture Notes in Computer Science, pages 46–59. Springer-Verlag, 1999.CrossRefGoogle Scholar
  3. DKR97.
    J. Daemen, L. Knudsen, and V. Rijmen. The block cipher Square. In Fast Software Encryption’ 97, pages 149–165. Springer-Verlag, 1997.Google Scholar
  4. DR98.
    Joan Daemen and Vincent Rijmen. AES proposal: Rijndael. In AES Round 1 Technical Evaluation CD-1: Documentation. NIST, August 1998. See http://www.esat.kuleuven.ac.be/~rijmen/rijndael/ or http://www.nist.gov/aes.
  5. GM00.
    Henri Gilbert, Marine Minier. A collision attack on 7 rounds of Rijndael. In The third Advanced Encryption Standard Candidate Conference, pages 230–241. NIST, April 2000. See http://www.nist.gov/aes.
  6. KSW96.
    John Kelsey, Bruce Schneier, and David Wagner. Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and triple-DES. In Neal Koblitz, editor, Advances in Cryptology-CRYPTO '96, volume 1109 of Lecture Notes in Computer Science, pages 237–251. Springer-Verlag, 1996.Google Scholar
  7. KSW97.
    John Kelsey, Bruce Schneier, and David Wagner. Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. In Information and Communications Security, First International Conference Proceedings, pages 203–207. Springer-Verlag, 1997.Google Scholar
  8. Luc00.
    Stefan Lucks. Attacking seven rounds of Rijndael under 192-bit and 256-bit keys. In The third Advanced Encryption Standard Candidate Conference, pages 215–229. NIST, April 2000. See http://www.nist.gov/aes.

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Niels Ferguson
    • 1
  • John Kelsey
    • 1
  • Stefan Lucks
    • 2
  • Bruce Schneier
    • 1
  • Mike Stay
    • 3
  • David Wagner
    • 4
  • Doug Whiting
    • 5
  1. 1.Counterpane Internet Security, Inc.San Jose
  2. 2.University of MannheimMannheimGermany
  3. 3.AccessData Corp. 2500N. UniversityProvo
  4. 4.University of California BerkeleyBerkeley
  5. 5.Hi/fn, Inc., 5973Carlsbad

Personalised recommendations