Paper 2008/438

New Related-Key Boomerang Attacks on AES

Michael Gorski and Stefan Lucks

Abstract

In this paper we present two new attacks on round reduced versions of the AES. We present the first application of the related-key boomerang attack on 7 and 9 rounds of AES-192. The 7-round attack requires only 2^{18} chosen plaintexts and ciphertexts and needs 2^{67.5} encryptions. We extend our attack to nine rounds of AES-192. This leaves to a data complexity of 2^{67} chosen plaintexts and ciphertexts using about 2^{143.33} encryptions to break 9 rounds of AES-192.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. IndoCrypt 2008
Keywords
block ciphersAESdifferential cryptanalysisrelated-key boomerang attack
Contact author(s)
Michael Gorski @ uni-weimar de
History
2008-10-20: received
Short URL
https://ia.cr/2008/438
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2008/438,
      author = {Michael Gorski and Stefan Lucks},
      title = {New Related-Key Boomerang Attacks on AES},
      howpublished = {Cryptology ePrint Archive, Paper 2008/438},
      year = {2008},
      note = {\url{https://eprint.iacr.org/2008/438}},
      url = {https://eprint.iacr.org/2008/438}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.