Paper 2019/652
The Exchange Attack: How to Distinguish Six Rounds of AES with chosen plaintexts
Navid Ghaedi Bardeh and Sondre Rønjom
Abstract
In this paper we present exchange-equivalence attacks which is a new cryptanalytic attack technique suitable for SPN-like block cipher designs. Our new technique results in the first secret-key chosen plaintext distinguisher for 6-round AES. The complexity of the distinguisher is about
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Published by the IACR in ASIACRYPT 2019
- Keywords
- SPNAESExchange Equivalence AttacksExchange Invariant SetsExchange Equivalence ClassSecret-Key modelDifferential Cryptanalysis
- Contact author(s)
- Navid bardeh @ uib no
- History
- 2019-09-14: revised
- 2019-06-04: received
- See all versions
- Short URL
- https://ia.cr/2019/652
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2019/652, author = {Navid Ghaedi Bardeh and Sondre Rønjom}, title = {The Exchange Attack: How to Distinguish Six Rounds of {AES} with $2^{88.2}$ chosen plaintexts}, howpublished = {Cryptology {ePrint} Archive, Paper 2019/652}, year = {2019}, url = {https://eprint.iacr.org/2019/652} }