Paper 2024/483

Lower data attacks on Advanced Encryption Standard

Orhun Kara, Izmir Institute of Technology (IZTECH)
Abstract

The Advanced Encryption Standard (AES) is one of the most commonly used and analyzed encryption algorithms. In this work, we present new combinations of some prominent attacks on AES, achieving new records in data requirements among attacks, utilizing only $2^4$ and $2^{16}$ chosen plaintexts (CP) for 6-round and 7-round AES-192/256 respectively. One of our attacks is a combination of a meet-in-the-middle (MiTM) attack with a square attack mounted on 6-round AES-192/256 while another attack combines an MiTM attack and an integral attack, utilizing key space partitioning technique, on 7-round AES-192/256. Moreover, we illustrate that impossible differential (ID) attacks can be viewed as the dual of MiTM attacks in certain aspects which enables us to recover the correct key using the meet-in-the-middle (MiTM) technique instead of sieving through all potential wrong keys in our ID attack. Furthermore, we introduce the constant guessing technique in the inner rounds which significantly reduces the number of key bytes to be searched. The time and memory complexities of our attacks remain marginal.

Note: Should citation be necessary, kindly reference the original publication which is available at: https://journals.tubitak.gov.tr/elektrik/vol32/iss2/8

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Turkish Journal of Electrical Engineering & Computer Sciences
DOI
10.55730/1300-0632.4072
Keywords
Block cipherAESmeet-in-the-middle attacksquare attackcryptanalysisencryptionimpossible differential attack
Contact author(s)
orhunkara @ iyte edu tr
History
2024-03-26: approved
2024-03-25: received
See all versions
Short URL
https://ia.cr/2024/483
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/483,
      author = {Orhun Kara},
      title = {Lower data attacks on Advanced Encryption Standard},
      howpublished = {Cryptology ePrint Archive, Paper 2024/483},
      year = {2024},
      doi = {10.55730/1300-0632.4072},
      note = {\url{https://eprint.iacr.org/2024/483}},
      url = {https://eprint.iacr.org/2024/483}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.