Cryptology ePrint Archive: Report 2008/438

New Related-Key Boomerang Attacks on AES

Michael Gorski and Stefan Lucks

Abstract: In this paper we present two new attacks on round reduced versions of the AES. We present the first application of the related-key boomerang attack on 7 and 9 rounds of AES-192. The 7-round attack requires only 2^{18} chosen plaintexts and ciphertexts and needs 2^{67.5} encryptions. We extend our attack to nine rounds of AES-192. This leaves to a data complexity of 2^{67} chosen plaintexts and ciphertexts using about 2^{143.33} encryptions to break 9 rounds of AES-192.

Category / Keywords: secret-key cryptography / block ciphers, AES, differential cryptanalysis, related-key boomerang attack

Publication Info: IndoCrypt 2008

Date: received 12 Oct 2008

Contact author: Michael Gorski (at) uni-weimar de

Available format(s): PDF | BibTeX Citation

Version: 20081020:184341 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]