Cryptology ePrint Archive: Report 2010/168

A Meet-in-the-Middle Attack on ARIA

Xuehai Tang, Bing Sun, Ruilin Li and Chao Li

Abstract: In this paper, we study the meet-in-the-middle attack against block cipher ARIA. We find some new 3-round and 4-round distinguish- ing properties of ARIA. Based on the 3-round distinguishing property, we can apply the meet-in-the-middle attack with up to 6 rounds for all versions of ARIA. Based on the 4-round distinguishing property, we can mount a successful attack on 8-round ARIA-256. Furthermore, the 4-round distinguishing property could be improved which leads to a 7-round attack on ARIA-192. The data and time complexities of 7-round attack are 2^120 and 2^185:3, respectively. The data and time complexities of 8-round attack are 2^56 and 2^251:6, respectively. Compared with the existing cryptanalytic results on ARIA, our 5-round attack has the lowest data and time complexities and the 6-round attack has the lowest data complexity. Moreover, it is shown that 8-round ARIA-256 is not immune to the meet-in-the-middle attack.

Category / Keywords: block cipher, ARIA, meet-in-the-middle, time-memory trade-off

Date: received 30 Mar 2010

Contact author: txh0203 at 163 com

Available format(s): PDF | BibTeX Citation

Version: 20100330:135801 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]