Paper 2008/438
New Related-Key Boomerang Attacks on AES
Michael Gorski and Stefan Lucks
Abstract
In this paper we present two new attacks on round reduced versions of the AES. We present the first application of the related-key boomerang attack on 7 and 9 rounds of AES-192. The 7-round attack requires only 2^{18} chosen plaintexts and ciphertexts and needs 2^{67.5} encryptions. We extend our attack to nine rounds of AES-192. This leaves to a data complexity of 2^{67} chosen plaintexts and ciphertexts using about 2^{143.33} encryptions to break 9 rounds of AES-192.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. IndoCrypt 2008
- Keywords
- block ciphersAESdifferential cryptanalysisrelated-key boomerang attack
- Contact author(s)
- Michael Gorski @ uni-weimar de
- History
- 2008-10-20: received
- Short URL
- https://ia.cr/2008/438
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2008/438, author = {Michael Gorski and Stefan Lucks}, title = {New Related-Key Boomerang Attacks on {AES}}, howpublished = {Cryptology {ePrint} Archive, Paper 2008/438}, year = {2008}, url = {https://eprint.iacr.org/2008/438} }