International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR News item: 06 July 2012

Deukjo Hong, Dong-Chan Kim, Daesung Kwon
ePrint Report ePrint Report
We study the slow diffusion of the AES key schedule for 256-bit keys and find weakness which can be used in the preimage attack on Davis-Meyer mode. Our preimage attack works for 8 rounds of AES- 256 with the computational complexity of $2^{124.9}$, while the best previous attack works for 7 rounds of AES-256. It is also extended to the preimage attack on some well-known double-block-length hash modes assuming the underlying block cipher is 8-round AES-256, whose computational complexity is $2^{252.9}$.

Expand

Additional news items may be found on the IACR news page.