Nowy atak na AES-256

Nowy atak na szyfr AES-192 oraz AES-256 opublikowany przez Biryukova i Khovratovicha pozwala na zredukowanie złożoności łamania tego ostatniego do $2^{119}$ łatwiej niż najlepszy znany dotąd atak Biryukov-Khovratovich-Nikolić. Oba są atakami z użyciem kluczy pokrewnych (related key).

Abstract: In this paper we present two related-key attacks on the full AES. For AES-256 we show the first key recovery attack that works for all the keys and has complexity $2^{119}$, while the recent attack by Biryukov-Khovratovich-Nikolic works for a weak key class and has higher complexity. The second attack is the first cryptanalysis of the full AES-192. Both our attacks are boomerang attacks, which are based on the recent idea of finding local collisions in block ciphers and enhanced with the boomerang switching techniques to gain free rounds in the middle.

Alex Biryukov and Dmitry Khovratovich, "Related-key Cryptanalysis of the Full AES-192 and AES-256", 29 maja 2009


Comment viewing options

This question is for testing whether you are a human visitor and to prevent automated spam submissions.
Select your preferred way to display the comments and click "Save settings" to activate your changes.

I kolejny "atak", tym razem opublikowany przez zirytowanego współautora AES, w stylu Alana Sokala :)

Inny atak na zredukowaną wersję AES:

Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds
Alex Biryukov and Orr Dunkelman and Nathan Keller and Dmitry Khovratovich and Adi Shamir