Advertisement

New Impossible Differential Attacks on AES

  • Jiqiang Lu
  • Orr Dunkelman
  • Nathan Keller
  • Jongsung Kim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5365)

Abstract

In this paper we apply impossible differential attacks to reduced round AES. Using various techniques, including the early abort approach and key schedule considerations, we significantly improve previously known attacks due to Bahrak-Aref and Phan. The improvement of these attacks leads to better impossible differential attacks on 7-round AES-128 and AES-192, as well as to better impossible differential attacks on 8-round AES-256.

Keywords

AES Impossible differential cryptanalysis 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bahrak, B., Aref, M.R.: A Novel Impossible Differential Cryptanalysis of AES. In: Proceedings of the Western European Workshop on Research in Cryptology 2007, Bochum, Germany (2007)Google Scholar
  2. 2.
    Biham, E., Biryukov, A., Shamir, A.: Miss in the Middle Attacks on IDEA and Khufu. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 124–138. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  3. 3.
    Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of Skipjack Reduced to 31 Rounds. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 12–23. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  4. 4.
    Biham, E., Keller, N.: Cryptanalysis of Reduced Variants of Rijndael (unpublished manuscript, 1999)Google Scholar
  5. 5.
    Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard. Springer, Heidelberg (1993)CrossRefzbMATHGoogle Scholar
  6. 6.
    Chen, J.: Personal communications (August 2008)Google Scholar
  7. 7.
    Chen, J., Wei, Y., Hu, Y.: A New Method for Impossible Differential Cryptanalysis of 7-round Advanced Encryption Standard. In: Proceedings of International Conference on Communications, Circuits and Systems Proceedings 2006, vol. 3, pp. 1577–1579. IEEE, Los Alamitos (2006)Google Scholar
  8. 8.
    Chen, J., Hu, Y., Wei, Y.: A New Method for Impossible Differential cryptanalysis of 8-Round Advanced Encryption Standard. Wuhan University Journal of National Sciences 11(6), 1559–1562 (2006)MathSciNetCrossRefzbMATHGoogle Scholar
  9. 9.
    Chen, J., Hu, Y., Zhang, Y.: Impossible differential cryptanalysis of Advanced Encryption Standard. Science in China Series F: Information Sciences 50(3), 342–350 (2007)MathSciNetCrossRefzbMATHGoogle Scholar
  10. 10.
    Cheon, J.H., Kim, M., Kim, K., Lee, J.-Y., Kang, S.: Improved Impossible Differential Cryptanalysis of Rijndael and Crypton. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 39–49. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  11. 11.
    Daemen, J., Rijmen, V.: AES Proposal: Rijndael, NIST AES proposal (1998)Google Scholar
  12. 12.
    Daemen, J., Rijmen, V.: The design of Rijndael: AES — the Advanced Encryption Standard. Springer, Heidelberg (2002)CrossRefzbMATHGoogle Scholar
  13. 13.
    Demirci, H., Selçuk, A.A.: A Meet-in-the-Middle Attack on 8-Round AES. In: Proceedings of Fast Software Encryption 15. LNCS, vol. 5806, pp. 116–126. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  14. 14.
    Ferguson, N., Kelsey, J., Lucks, S., Schneier, B., Stay, M., Wagner, D., Whiting, D.: Improved Cryptanalysis of Rijndael. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 213–230. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  15. 15.
    Gilbert, H., Minier, M.: A collision attack on 7 rounds of Rijndael. In: Proceedings of the Third AES Candidate Conference (AES3), New York, USA, pp. 230–241 (2000)Google Scholar
  16. 16.
    Kim, J., Hong, S., Preneel, B.: Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 225–241. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  17. 17.
    Lucks, S.: Attacking Seven Rounds of Rijndael under 192-bit and 256-bit Keys. In: Proceedings of the Third AES Candidate Conference (AES3), New York, USA, pp. 215–229 (2000)Google Scholar
  18. 18.
    Phan, R.C.-W.: Impossible Differential Cryptanalysis of 7-round Advanced Encryption Standard (AES). Information Processing Letters 91(1), 33–38 (2004)MathSciNetCrossRefzbMATHGoogle Scholar
  19. 19.
    Zhang, W., Wu, W., Feng, D.: New Results on Impossible Differential Cryptanalysis of Reduced AES. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 239–250. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  20. 20.
    Zhang, W., Wu, W., Zhang, L., Feng, D.: Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol. 4356, pp. 15–27. Springer, Heidelberg (2007)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Jiqiang Lu
    • 1
  • Orr Dunkelman
    • 2
  • Nathan Keller
    • 3
  • Jongsung Kim
    • 4
  1. 1.Information Security Group, Royal Holloway, University of London Egham, Surrey TW20 0EX, UK and Department of Mathematics and Computer Science, Eindhoven University of Technology, 5600 MB EindhovenThe Netherlands
  2. 2.Département d’InformatiqueÉcole Normale SupérieureParisFrance
  3. 3.Einstein Institute of MathematicsHebrew UniversityJerusalemIsrael
  4. 4.Center for Information Security Technologies(CIST)Korea UniversitySeoulKorea

Personalised recommendations