Cryptology ePrint Archive: Report 2003/022

Did Filiol Break AES ?

Nicolas T. Courtois and Robert T. Johnson and Pascal Junod and Thomas Pornin and Michael Scott

Abstract: On January 8th 2003, Eric Filiol published on the eprint a paper (eprint.iacr.org/2003/003/) in which he claims that AES can be broken by a very simple and very fast ciphertext-only attack. If such an attack existed, it would be the biggest discovery in code-breaking since some 10 or more years.

Unfortunately the result is very hard to believe. In this paper we present the results of computer simulations done by several independent people, with independently written code. Nobody has confirmed a single anomaly in AES, even for much weaker versions of the bias claimed by the author. We also studied the source code provided by the author to realize that the first version had various issues and bugs, and the latest version still does not confirm the claimed result on AES.

Category / Keywords: secret-key cryptography / block ciphers, AES, boolean functions, linear cryptanalysis, ciphertext-only attacks, stream ciphers

Date: received 4 Feb 2003, last revised 22 Jul 2003

Contact author: courtois at minrank org

Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation

Note: Filiol modified many times his claims and his results on AES. Yet, none of these have ever been confirmed by a single person other than the author. The latest source code from July 2003 does not break AES either, see Appendix B.2.

Version: 20030722:110653 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]