International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Feasible Attack on the 13-round AES-256

Authors:
Alex Biryukov
Dmitry Khovratovich
Download:
URL: http://eprint.iacr.org/2010/257
Search ePrint
Search Google
Abstract: In this note we present the first attack with feasible complexity on the 13-round AES-256. The attack runs in the related-subkey scenario with four related keys, in 2^{76} time, data, and memory.
BibTeX
@misc{eprint-2010-23158,
  title={Feasible Attack on the 13-round AES-256},
  booktitle={IACR Eprint archive},
  keywords={secret-key cryptography / aes, cryptanalysis, related keys, boomerang attack},
  url={http://eprint.iacr.org/2010/257},
  note={ khovratovich@gmail.com, alex.cryptan@gmail.com 14734 received 5 May 2010},
  author={Alex Biryukov and Dmitry Khovratovich},
  year=2010
}