【24h】

Improved Single-Key Attacks on 8-Round AES-192 and AES-256

机译:在8轮AES-192和AES-256上改进了单键攻击

获取原文

摘要

AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks were recently found against two of its flavors (AES-192 and AES-256). However, such a strong type of attack is not universally accepted as a valid attack model, and in the more standard single-key attack model at most 8 rounds of these two versions can be currently attacked. In the case of 8-round AES-192, the only known attack (found 10 years ago) is extremely marginal, requiring the evaluation of essentially all the 2~(128) possible plaintext/cipher text pairs in order to speed up exhaustive key search by a factor of 16. In this paper we introduce three new cryptanalytic techniques, and use them to get the first non-marginal attack on 8-round AES-192 (making its time complexity about a million times faster than exhaustive search, and reducing its data complexity to about 1/32,000 of the full codebook), In addition, our new techniques can reduce the best known time complexities for all the other combinations of 7-round and 8-round AES-192 and AES-256.
机译:AES是当今最广泛使用的块密码,其安全性是密码分析中最重要的问题之一。在分析13年后,最近发现相关关键攻击是针对其两种口味(AES-192和AES-256)。但是,这种强烈类型的攻击是没有被普遍接受的有效攻击模型,并且在最标准的单键攻击模型中,这两个版本的最多8轮可以目前攻击。在8轮AES-192的情况下,唯一已知的攻击(在10年前发现)是极其边缘的,要求评估基本上所有的2〜(128)可能的明文/密码文本对,以加速穷举键在这个尺寸尺寸的尺寸下搜索。在本文中,我们介绍了三种新的加密技术,并使用它们在8轮AES-192上获得第一个非边缘攻击(使其时间复杂程度大约超过详尽的搜索,以及将其数据复杂性降低到大约1 / 32,000的完整码本),此外,我们的新技术可以减少7轮和8轮AES-192和AES-256的所有其他组合的最佳已知时间复杂性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号