Fast Software Encryption Attacks on AES
In this work, we compare different faster than brute-force single-key attacks on the full AES in software. Contrary to dedicated hardware implementations, software implementations are more transparent and do not over-optimize a specific type of attack. We have analyzed and implemented a black-box brute-force attack, an optimized brute-force attack and a biclique attack on AES-128. Note that all attacks perform an exhaustive key search but the latter two do not need to recompute the whole cipher for all keys. To provide a fair comparison, we use CPUs with Intel AES-NI since these instructions tend to favor the generic black-box brute-force attack. Nevertheless, we are able to show that on Sandy Bridge the biclique attack on AES-128 is 17% faster, and the optimized brute-force attack is 3% faster than the black-box brute-force attack.
Keywordsfast software encryption AES brute-force attack biclique attack Intel AES-NI
Unable to display preview. Download preview PDF.
- 2.Bogdanov, A., Kavun, E.B., Paar, C., Rechberger, C., Yalcin, T.: Better than Brute-Force Optimized Hardware Architecture for Efficient Biclique Attacks on AES-128. In: Workshop records of Special-Purpose Hardware for Attacking Cryptographic Systems – SHARCS 2012, pp. 17–34 (2012), http://2012.sharcs.org/record.pdf
- 4.Fog, A.: Instruction tables – Lists of instruction latencies, throughputs and micro-operation breakdowns for Intel, AMD and VIA CPUs (2012), http://www.agner.org/optimize/instruction_tables.pdf (accessed September 2, 2012)
- 5.Gaj, K.: ATHENa: Automated Tool for Hardware EvaluatioN (2012) , http://cryptography.gmu.edu/athenadb/fpga_hash/table_view (accessed February 1, 2013)
- 7.Intel Corporation:ntel® Advanced Encryption Standard (AES) Instruction Set, White Paper. Tech. rep., Intel Mobility Group, Israel Development Center, Israel (January 2010)Google Scholar
- 8.Intel Corporation: Intel® 64 and IA-32 Architectures Software Developer’s Manual. Intel Corporation (March 2012)Google Scholar
- 9.NIST: Specification for the Advanced Encryption Standard (AES). National Institute of Standards and Technology (2001)Google Scholar
- 11.SHA-3 Zoo Editors: SHA-3 Hardware Implementations (2012), http://ehash.iaik.tugraz.at/wiki/SHA-3_Hardware_Implementations (accessed February 1, 2013)