Paper 2024/1447
Generic Differential Key Recovery Attacks and Beyond
Abstract
At Asiacrypt 2022, a holistic key guessing strategy was proposed to yield the most efficient key recovery for the rectangle attack. Recently, at Crypto 2023, a new cryptanalysis technique--the differential meet-in-the-middle (MITM) attack--was introduced. Inspired by these two previous works, we present three generic key recovery attacks in this paper. First, we extend the holistic key guessing strategy from the rectangle to the differential attack, proposing the generic classical differential attack (GCDA). Next, we combine the holistic key guessing strategy with the differential MITM attack, resulting in the generalized differential MITM attack (GDMA). Finally, we apply the MITM technique to the rectangle attack, creating the generic rectangle MITM attack (GRMA). In terms of applications, we improve 12/13-round attacks on AES-256. For 12-round AES-256, by using the GDMA, we reduce the time complexity by a factor of
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- A major revision of an IACR publication in ASIACRYPT 2024
- Keywords
- Differential cryptanalysisRectangle attackMeet-in-the-middleKey recoveryAESKATANSKINNYe
- Contact author(s)
-
songling qs @ gmail com
liuhuimin301 @ gmail com
yangqianqian @ iie ac cn
icsnow98 @ gmail com
hulei @ iie ac cn
cryptjweng @ gmail com - History
- 2024-09-18: approved
- 2024-09-17: received
- See all versions
- Short URL
- https://ia.cr/2024/1447
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/1447, author = {Ling Song and Huimin Liu and Qianqian Yang and Yincen Chen and Lei Hu and Jian Weng}, title = {Generic Differential Key Recovery Attacks and Beyond}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1447}, year = {2024}, url = {https://eprint.iacr.org/2024/1447} }