CryptoDB
Feasible Attack on the 13-round AES-256
Authors: | |
---|---|
Download: | |
Abstract: | In this note we present the first attack with feasible complexity on the 13-round AES-256. The attack runs in the related-subkey scenario with four related keys, in 2^{76} time, data, and memory. |
BibTeX
@misc{eprint-2010-23158, title={Feasible Attack on the 13-round AES-256}, booktitle={IACR Eprint archive}, keywords={secret-key cryptography / aes, cryptanalysis, related keys, boomerang attack}, url={http://eprint.iacr.org/2010/257}, note={ khovratovich@gmail.com, alex.cryptan@gmail.com 14734 received 5 May 2010}, author={Alex Biryukov and Dmitry Khovratovich}, year=2010 }