首页> 外文会议>Australasian conference on information security and privacy >Fast Chosen-Key Distinguish Attacks on Round-Reduced AES-192
【24h】

Fast Chosen-Key Distinguish Attacks on Round-Reduced AES-192

机译:对舍入减少后的AES-192进行快速的选择键区分攻击

获取原文

摘要

The open-key attack is a very popular research topic in the symmetric-key community recently. In this paper, we focus on the security of AES-192 in one of its settings, namely the chosen-key setting. First, thanks to the linear relations between most of AES-192 subkeys, we construct an 8-round chosen-key distinguishers for it using the meet-in-the-middle idea and the SuperSbox technique. Then we turn this distin-guisher into a key-recovery attack with a time complexity of one 8-round AES-192 encryption. Using the same approaches and with more efforts on exploiting the weak key schedule of this variant, 9-round chosen-key distinguishers is constructed and the master key is recovered afterwards at the cost of one 9-round AES-192 encryption. These results have been experimentally confirmed and two examples can be found in the appendix. While our work may not pose a threat to the security of AES-192 in a traditional way as those single-key recovery attacks do, we believe it do prove a non-trivial weakness in its key schedule to some extent and thus undermines its expectation as an ideal building block for hash functions.
机译:最近,在对称密钥社区中,开放密钥攻击是一个非常受欢迎的研究主题。在本文中,我们将重点放在AES-192的一种设置(即所选密钥设置)的安全性上。首先,由于大多数AES-192子密钥之间的线性关系,我们使用中间相遇的想法和SuperSbox技术为其构造了一个8轮选择密钥识别符。然后,我们将这种区分密码的行为转变为一次密钥恢复攻击,其时间复杂度为一次8轮AES-192加密。使用相同的方法,并通过更多的努力来利用此变体的弱密钥时间表,构建了9轮选择密钥识别器,然后以一次9轮AES-192加密为代价恢复了主密钥。这些结果已通过实验得到证实,并且可以在附录中找到两个示例。尽管我们的工作可能不会像那些单密钥恢复攻击那样以传统方式对AES-192的安全性构成威胁,但我们认为它确实在关键时间表上证明了一个不小的缺陷,因此破坏了其预期。作为哈希函数的理想构建块。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号