Implementation and Improvement of the Partial Sum Attack on 6-Round AES
The Partial Sum Attack is one of the most powerful attacks, independent of the key schedule, developed in the last 15 years against reduced-round versions of AES. In this chapter, we introduce a slight improvement to the basic attack which lowers the number of chosen plaintexts needed to successfully mount it. Our version of the attack on 6-round AES can be carried out completely in practice, as we demonstrate providing a full implementation. We also detail the structure of our implementation, showing the performances we achieve.
KeywordsBlock Cipher Advance Encryption Standard Fourth Round Verification Step Partial Decryption
Most of the results shown in this work were developed in the first author’s Master’s thesis and he would like to thank the other authors, especially his supervisor (the last author). For interesting discussions, the authors would like to thank Anna Rimoldi.
- 1.Aldà F (2013) The Partial Sum Attack on 6-round reduced AES: implementation and improvement. Master’s thesis (laurea magistrale), University of Trento, Department of MathematicsGoogle Scholar
- 3.Daemen J, Rijmen V (1998) AES proposal: Rijndael. In: First advanced encryption standard (AES) conferenceGoogle Scholar
- 4.Daemen J, Rijmen V (2002) The design of Rijndael. In: AES—the advanced encryption standard. Information security and cryptography. Springer, BerlinGoogle Scholar
- 5.Ferguson N, Kelsey J, Lucks S, Schneier B, Stay M, Wagner D, Whiting D (2001) Improved cryptanalysis of Rijndael. In: Fast software encryption. Springer, Berlin, pp 213–230Google Scholar
- 6.Gabriel E, Fagg GE, Bosilca G, Angskun T, Dongarra JJ, Squyres JM, Sahay V, Kambadur P, Barrett B, Lumsdaine A, Castain RH, Daniel DJ, Graham RL, Woodall TS (2004) Open MPI: goals, concept, and design of a next generation MPI implementation. LNCS, vol 3241. Springer, Heidelberg, pp 97–104Google Scholar
- 7.Galice S, Minier M (2008) Improving integral attacks gainst Rijndael-256 up to 9 rounds. In: Progress in cryptology—AFRICACRYPT 2008. Springer, Heidelberg, pp 1–15Google Scholar
- 8.Graham RL, Woodall TS, Squyres JM (2006) Open MPI: a flexible high performance MPI. LNCS, vol 3911. Springer, Heidelberg, pp 228–239Google Scholar
- 10.Pub NF (2001) 197: advanced encryption standard (AES), vol 197, pp 441–0311Google Scholar
- 11.Silberschatz A, Galvin PB, Gagne G (2008) Operating system concepts. Wiley, New YorkGoogle Scholar
- 12.Tunstall M (2012) Improved “partial sums”-based square attack on AES. In: International conference on security and cryptography—SECRYPT 2012. INSTICC Press, pp 25–34Google Scholar