Advertisement

Practical Attacks on Reduced-Round AES

  • Navid Ghaedi BardehEmail author
  • Sondre Rønjom
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11627)

Abstract

In this paper we investigate the security of 5-round AES against two different attacks in an adaptive setting. We present a practical key-recovery attack on 5-round AES with a secret s-box that requires \(2^{32}\) adaptively chosen ciphertexts, which is as far as we know a new record. In addition, we present a new and practical key-independent distinguisher for 5-round AES which requires \(2^{27.2}\) adaptively chosen ciphertexts. While the data complexity of this distinguisher is in the same range as the current best 5-round distinguisher [14], it exploits new structural properties of 5-round AES.

Keywords

AES Zero-difference Secret-key distinguisher Differential Secret s-box 

Notes

Acknowledgments

We thank the anonymous reviewers for their valuable comments and suggestions. This Research was supported by the Norwegian Research Council.

References

  1. 1.
    Bar-On, A., Dunkelman, O., Keller, N., Ronen, E., Shamir, A.: Improved key recovery attacks on reduced-round AES with practical data and memory complexities. In: Advances in Cryptology - CRYPTO 2018–38th Annual International Cryptology Conference, Santa Barbara, CA, USA, 19–23 August 2018, Proceedings, Part II, pp. 185–212 (2018).  https://doi.org/10.1007/978-3-319-96881-0_7Google Scholar
  2. 2.
    Biryukov, A., Khovratovich, D.: Related-key cryptanalysis of the full AES-192 and AES-256. In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, 6–10 December 2009, Proceedings, pp. 1–18 (2009).  https://doi.org/10.1007/978-3-642-10366-7_1Google Scholar
  3. 3.
    Biryukov, A., Khovratovich, D., Nikolic, I.: Distinguisher and related-key attack on the full AES-256. In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, 16–20 August 2009, Proceedings, pp. 231–249 (2009).  https://doi.org/10.1007/978-3-642-03356-8_14CrossRefGoogle Scholar
  4. 4.
    Bouillaguet, C., Derbez, P., Dunkelman, O., Fouque, P., Keller, N., Rijmen, V.: Low-data complexity attacks on AES. IEEE Trans. Inf. Theor. 58(11), 7002–7017 (2012).  https://doi.org/10.1109/TIT.2012.2207880MathSciNetCrossRefzbMATHGoogle Scholar
  5. 5.
    Daemen, J., Rijmen, V.: The block cipher rijndael. In: Smart Card Research and Applications, This International Conference, CARDIS 1998, Louvain-la-Neuve, Belgium, 14–16 September 1998, Proceedings, pp. 277–284 (1998).  https://doi.org/10.1007/10721064_26Google Scholar
  6. 6.
    Derbez, P., Fouque, P., Jean, J.: Improved key recovery attacks on reduced-round AES in the single-key setting. In: Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, 26–30 May 2013, Proceedings, pp. 371–387 (2013).  https://doi.org/10.1007/978-3-642-38348-9_23CrossRefGoogle Scholar
  7. 7.
    Dunkelman, O., Keller, N., Shamir, A.: Improved single-key attacks on 8-round AES-192 and AES-256. In: Advances in Cryptology - ASIACRYPT 2010–16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, 5–9 December 2010, Proceedings, pp. 158–176 (2010).  https://doi.org/10.1007/978-3-642-17373-8_10CrossRefGoogle Scholar
  8. 8.
    Ferguson, N., et al.: Improved cryptanalysis of rijndael. In: Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, 10–12 April 2000, Proceedings, pp. 213–230 (2000).  https://doi.org/10.1007/3-540-44706-7_15CrossRefGoogle Scholar
  9. 9.
    Gilbert, H., Minier, M.: A collision attack on 7 rounds of rijndael. In: AES Candidate Conference, pp. 230–241 (2000)Google Scholar
  10. 10.
    Grassi, L.: Mixcolumns properties and attacks on (round-reduced) AES with a single secret s-box. In: Topics in Cryptology - CT-RSA 2018 - The Cryptographers’ Track at the RSA Conference 2018, San Francisco, CA, USA, 16–20 April 2018, Proceedings, pp. 243–263 (2018).  https://doi.org/10.1007/978-3-319-76953-0_13Google Scholar
  11. 11.
    Grassi, L., Rechberger, C., Rønjom, S.: Subspace trail cryptanalysis and its applications to AES. IACR Trans. Symmetric Cryptol. 2016(2), 192–225 (2016). 10.13154/tosc.v2016.i2.192-225Google Scholar
  12. 12.
    Grassi, L., Rechberger, C., Rønjom, S.: A new structural-differential property of 5-round AES. In: Advances in Cryptology - EUROCRYPT 2017–36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, 30 April - 4 May 2017, Proceedings, Part II, pp. 289–317 (2017).  https://doi.org/10.1007/978-3-319-56614-6_10Google Scholar
  13. 13.
    Gueron, S., Mouha, N.: Simpira v2: A family of efficient permutations using the AES round function. In: Advances in Cryptology - ASIACRYPT 2016–22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, 4–8 December 2016, Proceedings, Part I, pp. 95–125 (2016).  https://doi.org/10.1007/978-3-662-53887-6_4CrossRefGoogle Scholar
  14. 14.
    Rønjom, S., Bardeh, N.G., Helleseth, T.: Yoyo tricks with AES. In: Advances in Cryptology - ASIACRYPT 2017–23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, 3–7 December 2017, Proceedings, Part I, pp. 217–243 (2017).  https://doi.org/10.1007/978-3-319-70694-8_8CrossRefGoogle Scholar
  15. 15.
    Sun, B., Liu, M., Guo, J., Qu, L., Rijmen, V.: New insights on aes-like SPN ciphers. In: Advances in Cryptology - CRYPTO 2016–36th Annual International Cryptology Conference, Santa Barbara, CA, USA, 14–18 August 2016, Proceedings, Part I, pp. 605–624 (2016).  https://doi.org/10.1007/978-3-662-53018-4_22CrossRefGoogle Scholar
  16. 16.
    Tiessen, T., Knudsen, L.R., Kölbl, S., Lauridsen, M.M.: Security of the AES with a secret s-box. In: Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, 8–11 March 2015, Revised Selected Papers, pp. 175–189 (2015).  https://doi.org/10.1007/978-3-662-48116-5_9CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of InformaticsUniversity of BergenBergenNorway
  2. 2.Nasjonal sikkerhetsmyndighetOsloNorway

Personalised recommendations