Skip to main content

New Improved Impossible Differential Attack on Reduced-Round AES-128

  • Conference paper
  • First Online:
Computer Science and Convergence

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 114))

Abstract

In this paper, we propose a novel impossible differential attack on 7-round AES-128. Firstly, we construct some new 2-round impossible differentials of AES, which allow us to distinguish the wrong keys from the correct key more efficiently. Based on them, we present an impossible differential attack on 7-round AES-128. The data complexity is about \( 2^{80} \) chosen plaintexts. Compared to the best known result, the data complexity of our attack is reduced by nearly \( 2^{ - 26.2} \) times.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hsu P, Tang W, Tsai C, Cheng B. Two-layer security scheme for AMI system. J Converg 2(1):47–52

    Google Scholar 

  2. Imani M. Taheri M, Naderi M. Security enhanced routing protocol for ad hoc networks. J Converg 1(1):43–48

    Google Scholar 

  3. Kumar D, Aseri TC, Patel RB. Multi-hop communication routing (MCR) protocol for heterogeneous wireless sensor networks. Int J Inform Technol Commun Converg 1(2):130–145

    Google Scholar 

  4. Rahman MZ, Pathan A. A case study: establishing redundant access networks in the telecommunication sector of a developing country. Int J Inform Technol Commun Converg 1(1):108–126

    Google Scholar 

  5. Daemen J, Rijmen V (2002) The design of Rijndael: AES—The advanced encryption standard. Springer, Heidelberg

    Book  Google Scholar 

  6. Murphy S, Robshaw MJB (2002) Essential algebraic structure within the AES. In: Yung M (ed) CRYPTO 2002. Lecture notes in computer science, vol 2442. Springer, Heidelberg, pp 1–16

    Google Scholar 

  7. Gilbert H, Minier M (2000) A collision attack on 7 rounds of Rijdael. In: The third AES candidate conference, pp 230–241

    Google Scholar 

  8. Demirci H, Taskin I, Coban M, Baysal A (2009) Improved meet-in-the-middle attacks on AES. In: Roy B, Sendrier N (eds) INDOCRYPT 2009. Lecture notes in computer science, vol 5922, Springer, Heidelberg, pp 144–156

    Google Scholar 

  9. Biryukov A, Khovratovich D, Nikolic I (2009) Distinguisher and related-key attack on the full AES-256. In: Halevi S (ed) CRYPTO 2009. Lecture notes in computer science, vol 5677, Springer, Heidelberg, pp 231–249

    Google Scholar 

  10. Bahrak B, Aref MR (2008) Impossible differential attack on seven-round AES-128. IET Inform Security 2:28–32

    Google Scholar 

  11. Zhang W, Wu W, Feng D (2007) New results on impossible differential cryptanalysis of reduced AES. In: Nam K-H, Rhee G (eds) ICISC 2007, Lecture notes in computer science, vol 4817, Springer, Heidelberg, pp 239–250

    Google Scholar 

  12. Lu J, Dunkelman O, Keller N, Kim J (2008) New impossible differential attacks on AES. In: Chowdhury DR, Rijmen V, Das A (eds) INDOCRYPT 2008, Lecture notes in computer science, vol 5365, Springer, Heidelberg, pp 279–293

    Google Scholar 

  13. Mala H, Dakhilalian M, Rijmen V, Modarres-Hashemi M (2010) Improved impossible differential cryptanalysis of 7-Round AES-128. In: Gong G, Gupta KC (eds) INDOCRYPT 2010, Lecture notes in computer science, vol 6498, Springer, Heidelberg, pp 282–291

    Google Scholar 

  14. Knudsen LR (1998) DEAL—A 128-bit Block Cipher, Technical report, Department of Informatics, University of Bergen, Norway

    Google Scholar 

  15. Biham E, Biryukov A, Shamir A. Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In: Stern J (ed) EUROCRYPT 1999, Lecture notes in computer

    Google Scholar 

Download references

Acknowledgments

This work has been supported by the National Natural Science Foundation of China (No. 61073150 and No. 61003278), the Opening Project of Shanghai Key Laboratory of Integrate Administration Technologies for Information Security, and the Fundamental Research Funds for the Central Universities.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ya Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media B.V.

About this paper

Cite this paper

Liu , Y., Gu, D., Liu, Z., Li, W., Kong, W. (2012). New Improved Impossible Differential Attack on Reduced-Round AES-128. In: J. (Jong Hyuk) Park, J., Chao, HC., S. Obaidat, M., Kim, J. (eds) Computer Science and Convergence. Lecture Notes in Electrical Engineering, vol 114. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2792-2_43

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-2792-2_43

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-2791-5

  • Online ISBN: 978-94-007-2792-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics