Paper 2022/845
Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256
Abstract
This paper introduces structure to key, in the related-key attack settings. While the idea of structure has been long used in keyrecovery attacks against block ciphers to enjoy the birthday effect, the same had not been applied to key materials due to the fact that key structure results in uncontrolled differences in key and hence affects the validity or probabilities of the differential trails. We apply this simple idea to improve the related-key boomerang attack against AES-256 by Biryukov and Khovratovich in 2009. Surprisingly, it turns out to be effective, i.e., both data and time complexities are reduced by a factor of about 2^8, to 2^92 and 2^91 respectively, at the cost of the amount of required keys increased from 4 to 2^19. There exist some tradeoffs between the data/time complexity and the number of keys. To the best of our knowledge, this is the first essential improvement of the attack against the full AES-256 since 2009. It will be interesting to see if the structure technique can be applied to other AES-like block ciphers, and to tweaks rather than keys of tweakable block ciphers so the amount of required keys of the attack will not be affected.
Metadata
- Available format(s)
- Category
- Attacks and cryptanalysis
- Publication info
- Published elsewhere. ACISP 2022
- Keywords
- AES differential boomerang key structure related key
- Contact author(s)
-
guojian @ ntu edu sg
songling qs @ gmail com
haoyang wang @ sjtu edu cn - History
- 2022-06-27: approved
- 2022-06-27: received
- See all versions
- Short URL
- https://ia.cr/2022/845
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2022/845, author = {Jian Guo and Ling Song and Haoyang Wang}, title = {Key Structures: Improved Related-Key Boomerang Attack against the Full {AES}-256}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/845}, year = {2022}, url = {https://eprint.iacr.org/2022/845} }