Article

Improved Single-Key Attacks on 8-round AES.

IACR Cryptology ePrint Archive 01/2010; 2010:322.
Source: DBLP
0 Followers
 · 
62 Views
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper presents ongoing work towards extensions of meetin-the-middle (MITM) attacks on block ciphers. Exploring developments inMITMattacks in hash analysis such as: (i) the splice-and-cut technique; (ii) the indirect-partial-matching technique. Our first contribution is that we show corrections to previous cryptanalysis and point out that the key schedule is more vulnerable to MITM attacks than previously reported. Secondlywe further improve the time complexities of previous attackswith (i) and (ii), now the 80-bit secret key of the full roundsKTANTAN-{32, 48, 64} can be recovered at time complexity of 272.9, 273.8 and 274.4 respectively, each requiring 4 chosen-plaintexts.
  • Lecture Notes in Computer Science 01/2011; DOI:10.1007/978-3-642-19574-7 · 0.51 Impact Factor
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper presents ongoing work towards extensions of meet-in-the-middle (MITM) attacks on block ciphers. Exploring developments in MITM attacks in hash analysis such as: (i) the splice-and-cut technique; (ii) the indirect-partial-matching technique. Our first contribution is that we show corrections to previous cryptanalysis and point out that the key schedule is more vulnerable to MITM attacks than previously reported. Secondly we further improve the time complexities of previous attacks with (i) and (ii), now the 80-bit secret key of the full rounds KTANTAN-{32,48,64} can be recovered at time complexity of 272.9, 273.8 and 274.4 respectively, each requiring 4 chosen-plaintexts.
    Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings; 01/2011

Preview

Download
1 Download