Improved Meet-in-the-Middle Attacks on Round-Reduced ARIA

  • Dongxia Bai
  • Hongbo YuEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7807)


ARIA is a 128-bit SPN block cipher selected as a Korean standard. This paper processes meet-in-the-middle attacks on reduced-round ARIA. Some 4-round and 5-round significant distinguishing properties which involve much fewer bytes parameters are proposed. Based on these better distinguishers, attacks on 7-round ARIA-192/256 and 8-round ARIA-256 are mounted with much lower complexities than previous meet-in-the-middle attacks. Furthermore, we present 7-round attack on ARIA-128 and 9-round attack on ARIA-256, which are both the first results for ARIA in terms of the meet-in-the-middle attack.


Meet-in-the-Middle Attack Cryptanalysis ARIA Block cipher 


  1. 1.
    Biryukov, A., De Cannière, C., Lano, J., Ors, S.B., Preneel, B.: Security and Performance Analysis of ARIA, Version 1.2, 7 January 2004Google Scholar
  2. 2.
    Chen S., Xu T.: Biclique Attack of the Full ARIA-256. IACR eprint archive.
  3. 3.
    Daemen, J., Rijmen, V.: The Design of Rijndael: AES—The Advanced Encryption Standard. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  4. 4.
    Demirci, H., Selçuk, A.A.: A meet-in-the-middle attack on 8-round AES. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 116–126. Springer, Heidelberg (2008) CrossRefGoogle Scholar
  5. 5.
    Derbez, P., Fouque, P.-A., Jean, J.: Improved key recovery attacks on reduced-round AES in the single-key setting. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 371–387. Springer, Heidelberg (2013) CrossRefGoogle Scholar
  6. 6.
    Diffie, W., Hellman, M.: Special feature exhaustive cryptanalysis of the NBS data encryption standard. Computer 10, 74–84 (1977)CrossRefGoogle Scholar
  7. 7.
    Du, C., Chen, J.: Impossible differential cryptanalysis of ARIA reduced to 7 rounds. In: Heng, S.-H., Wright, R.N., Goi, B.-M. (eds.) CANS 2010. LNCS, vol. 6467, pp. 20–30. Springer, Heidelberg (2010) CrossRefGoogle Scholar
  8. 8.
    Dunkelman, O., Keller, N., Shamir, A.: Improved single-key attacks on 8-round AES-192 and AES-256. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 158–176. Springer, Heidelberg (2010) CrossRefGoogle Scholar
  9. 9.
    Fleischmann, E., Forler, C., Gorski, M., Lucks, S.: New boomerang attacks on ARIA. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol. 6498, pp. 163–175. Springer, Heidelberg (2010) CrossRefGoogle Scholar
  10. 10.
    Korean Agency for Technology and Standards (KATS): 128 bit block encryption algorithm ARIA, KS X 1213:2004, December 2004 (in Korean)Google Scholar
  11. 11.
    Kwon, D., Kim, J., Park, S., Sung, S.H., et al.: New block cipher: ARIA. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 432–445. Springer, Heidelberg (2004)Google Scholar
  12. 12.
    Li, P., Sun, B., Li, C.: Integral cryptanalysis of ARIA. In: Bao, F., Yung, M., Lin, D., Jing, J. (eds.) Inscrypt 2009. LNCS, vol. 6151, pp. 1–14. Springer, Heidelberg (2010) CrossRefGoogle Scholar
  13. 13.
    Li, R., Sun, B., Zhang, P., Li, C.: New Impossible Differential Cryptanalysis of ARIA. IACR eprint archive.
  14. 14.
    Li, Y., Wu, W., Zhang, L.: Integral attacks on reduced-round ARIA block cipher. In: Kwak, J., Deng, R.H., Won, Y., Wang, G. (eds.) ISPEC 2010. LNCS, vol. 6047, pp. 19–29. Springer, Heidelberg (2010) CrossRefGoogle Scholar
  15. 15.
    Liu, Z., Gu, D., Liu, Y., Li, J., Li, W.: Linear cryptanalysis of ARIA block cipher. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) ICICS 2011. LNCS, vol. 7043, pp. 242–254. Springer, Heidelberg (2011) CrossRefGoogle Scholar
  16. 16.
    Lu, J., Kim, J.-S., Keller, N., Dunkelman, O.: Improving the efficiency of impossible differential cryptanalysis of reduced camellia and MISTY1. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 370–386. Springer, Heidelberg (2008) CrossRefGoogle Scholar
  17. 17.
    National Security Research Institute: Specification of ARIA, Version 1.0, January 2005.
  18. 18.
    Tang, X., Sun, B., Li, R., Li, C., Yin, J.: A meet-in-the-middle attack on reduced-round ARIA. J. Syst. Softw. 84(10), 1685–1692 (2011)CrossRefGoogle Scholar
  19. 19.
    Wu, W., Zhang, W., Feng, D.: Impossible differential cryptanalysis of reduced-round ARIA and Camellia. J. Comput. Sci. Technol. 22(3), 449–456 (2007)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Department of Computer Science and TechnologyTsinghua UniversityBeijingChina

Personalised recommendations