CryptoDB
New Related-Key Boomerang Attacks on AES
Authors: | |
---|---|
Download: | |
Abstract: | In this paper we present two new attacks on round reduced versions of the AES. We present the first application of the related-key boomerang attack on 7 and 9 rounds of AES-192. The 7-round attack requires only 2^{18} chosen plaintexts and ciphertexts and needs 2^{67.5} encryptions. We extend our attack to nine rounds of AES-192. This leaves to a data complexity of 2^{67} chosen plaintexts and ciphertexts using about 2^{143.33} encryptions to break 9 rounds of AES-192. |
BibTeX
@misc{eprint-2008-18151, title={New Related-Key Boomerang Attacks on AES}, booktitle={IACR Eprint archive}, keywords={secret-key cryptography / block ciphers, AES, differential cryptanalysis, related-key boomerang attack}, url={http://eprint.iacr.org/2008/438}, note={IndoCrypt 2008 Michael Gorski (at) uni-weimar de 14164 received 12 Oct 2008}, author={Michael Gorski and Stefan Lucks}, year=2008 }