International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

New Related-Key Boomerang Attacks on AES

Authors:
Michael Gorski
Stefan Lucks
Download:
URL: http://eprint.iacr.org/2008/438
Search ePrint
Search Google
Abstract: In this paper we present two new attacks on round reduced versions of the AES. We present the first application of the related-key boomerang attack on 7 and 9 rounds of AES-192. The 7-round attack requires only 2^{18} chosen plaintexts and ciphertexts and needs 2^{67.5} encryptions. We extend our attack to nine rounds of AES-192. This leaves to a data complexity of 2^{67} chosen plaintexts and ciphertexts using about 2^{143.33} encryptions to break 9 rounds of AES-192.
BibTeX
@misc{eprint-2008-18151,
  title={New Related-Key Boomerang Attacks on AES},
  booktitle={IACR Eprint archive},
  keywords={secret-key cryptography / block ciphers, AES, differential cryptanalysis, related-key boomerang attack},
  url={http://eprint.iacr.org/2008/438},
  note={IndoCrypt 2008 Michael Gorski (at) uni-weimar de 14164 received 12 Oct 2008},
  author={Michael Gorski and Stefan Lucks},
  year=2008
}