Related-key rectangle attacks on reduced AES-192 and AES-256

Jongsung Kim, Seokhie Hong, Bart Preneel

Research output: Chapter in Book/Report/Conference proceedingConference contribution

31 Citations (Scopus)

Abstract

This paper examines the security of AES-192 and AES-256 against a related-key rectangle attack. We find the following new attacks: 8-round reduced AES-192 with 2 related keys, 10-round reduced AES-192 with 64 or 256 related keys and 9-round reduced AES-256 with 4 related keys. Our attacks reduce the complexity of earlier attacks presented at FSE 2005 and Eurocrypt 2005: for reduced AES-192 with 8 rounds, we decrease the required number of related keys from 4 to 2 at the cost of a higher data and time complexity; we present the first shortcut attack on AES-192 reduced to 10 rounds; for reduced AES-256 with 9 rounds, we decrease the required number of related keys from 256 to 4 and both the data and time complexity at the cost of a smaller number of attacked rounds. Furthermore, we point out some flaw in the 9-round AES-192 attack presented at Eurocrypt 2005, show how to fix it and enhance the attack in terms of the number of related keys.

Original languageEnglish
Title of host publicationFast Software Encryption - 14th International Workshop, FSE 2007
PublisherSpringer Verlag
Pages225-241
Number of pages17
ISBN (Print)354074617X, 9783540746171
DOIs
Publication statusPublished - 2007
Event14th International Workshop on Fast Software Encryption, FSE 2007 - Luxembourg, Luxembourg
Duration: 2007 Mar 262007 Mar 28

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4593 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other14th International Workshop on Fast Software Encryption, FSE 2007
Country/TerritoryLuxembourg
CityLuxembourg
Period07/3/2607/3/28

Keywords

  • AES
  • Block ciphers
  • Cryptanalysis
  • Related-key rectangle attack

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Related-key rectangle attacks on reduced AES-192 and AES-256'. Together they form a unique fingerprint.

Cite this