Skip to main content
Log in

Single key recovery attacks on reduced AES-192 and Kalyna-128/256

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Demirci H, Selçuk A A. A meet-in-the-middle attack on 8-round AES. In: Fast Software Encyption. Berlin: Springer-Verlag, 2008. 116–126

    Chapter  Google Scholar 

  2. Demirci H, Tąskin I, Çoban M, et al. Improved meet-in-the-middle attacks on AES. In: Proceedings of International Conference on Cryptology in India. Berlin: Springer-Verlag, 2009. 144–156

    Google Scholar 

  3. Dunkelman O, Keller N, Shamir A. Improved singlekey attacks on 8-round AES-192 and AES-256. In: Advances in Cryptology—ASIACRYPT 2010. Berlin: Springer-Verlag, 2010. 158–176

    Chapter  Google Scholar 

  4. Derbez P, Fouque P A, Jean J. Improved key recovery attacks on reduced round AES in the single-key setting. In: Advances in Cryptology—EUROCRYPT 2013. Berlin: Springer-Verlag, 2013. 371–187

    Chapter  Google Scholar 

  5. Li L B, Jia K T, Wang X Y. Improved single-key attacks on 9-round AES-192/256. In: Fast Software Encyption. Berlin: Springer-Verlag, 2015. 127–146

    Google Scholar 

  6. Li R J, Jin C H. Meet-in-the-middle attacks on 10-round AES-256. Designs Codes Cryptogr, 2015, 80: 459–471

    Article  MathSciNet  MATH  Google Scholar 

  7. Huang J L, Lai X J. Revisiting key schedule’s diffusion in relation with round function’s diffusion. Designs Codes Cryptogr, 2014, 73: 85–103

    Article  MathSciNet  MATH  Google Scholar 

  8. Li L, Wu W L, Zheng Y F. Automatic search for key-bridging technique: applications to LBlock and TWINE. In: Fast Software Encryption. Berlin: Springer-Verlag, 2016. 247–267

    Google Scholar 

  9. AlTawy R, Abdelkhalek A, Youssef A M. A meet-in-the-middle attack on reduced-round Kalyna-b/2b. Ieice Trans Inf Syst, 2016, E99.D: 1246–1250

    Google Scholar 

  10. Akshima, Chang D H, Ghosh M, et al. Single key recovery attacks on 9-round Kalyna-128/256 and Kalyna-256/512. In: Information Security and Cryptology—ICISC 2015. Berlin: Springer-Verlag, 2015. 119–135

    Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. 61572125, 61373142), High Technology Field of “Action Plan for Scientific and Technological Innovation” in Shanghai (Grant No. 16511101400).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gaoli Wang.

Additional information

The authors declare that they have no conflict of interest.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, G., Zhu, C. Single key recovery attacks on reduced AES-192 and Kalyna-128/256. Sci. China Inf. Sci. 60, 099101 (2017). https://doi.org/10.1007/s11432-016-0417-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-016-0417-7

Navigation