【24h】

Related-Key Cryptanalysis of the Full AES-192 and AES-256

机译:完整的AES-192和AES-256的相关关键密码分析

获取原文

摘要

In this paper we present two related-key attacks on the full AES. For AES-256 we show the first key recovery attack that works for all the keys and has 2~(99.5) time and data complexity, while the recent attack by Biryukov-Khovratovich-Nikolic works for a weak key class and has much higher complexity. The second attack is the first cryptanalysis of the full AES-192. Both our attacks are boomerang attacks, which are based on the recent idea of finding local collisions in block ciphers and enhanced with the boomerang switching techniques to gain free rounds in the middle.
机译:在本文中,我们在整个AES上呈现了两个相关的关键攻击。对于AES-256,我们展示了适用于所有钥匙的第一个关键恢复攻击,并且有2〜(99.5)时间和数据复杂性,而Biryukov-Khovratovich-Nikolic攻击最近的攻击适用于弱势关键课程,复杂程度更高。第二次攻击是完整AES-192的第一个密码分析。我们的攻击都是博奥朗康攻击,这是基于最近在块密码中找到本地碰撞的想法,并通过Boomerang切换技术增强,以获得中间的自由圆。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号