Cryptology ePrint Archive: Report 2008/438
New Related-Key Boomerang Attacks on AES
Michael Gorski and Stefan Lucks
Abstract: In this paper we present two new attacks on round reduced versions of the AES. We present
the first application of the related-key boomerang attack on 7 and 9 rounds of AES-192. The 7-round attack requires only 2^{18} chosen plaintexts and ciphertexts and needs 2^{67.5} encryptions. We extend our attack to nine rounds of AES-192. This leaves to a data complexity of 2^{67} chosen plaintexts and ciphertexts using about 2^{143.33} encryptions to break 9 rounds of AES-192.
Category / Keywords: secret-key cryptography / block ciphers, AES, differential cryptanalysis, related-key boomerang attack
Publication Info: IndoCrypt 2008
Date: received 12 Oct 2008
Contact author: Michael Gorski (at) uni-weimar de
Available formats: PDF | BibTeX Citation
Version: 20081020:184341 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]