Abstract | ||
---|---|---|
Using a new 4-round impossible differential in AES that allows us to exploit the redundancy in the key schedule of AES-128 in a way more effective than previous work, we present a new impossible differential attack on 7 rounds of this block cipher. By this attack, 7-round AES-128 is breakable with a data complexity of about 2(106) chosen plaintexts and a time complexity equivalent to about 2(110) encryptions. This result is better than any previously known attack on AES-128 in the single-key scenario. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1007/978-3-642-17401-8_20 | PROGRESS IN CRYPTOLOGY - INDOCRYPT 2010 |
Keywords | Field | DocType |
AES, block cipher, cryptanalysis, impossible differential | Higher-order differential cryptanalysis,Key schedule,Boomerang attack,Block cipher,Advanced Encryption Standard,Computer science,Impossible differential cryptanalysis,Algorithm,Theoretical computer science,Linear cryptanalysis,Differential cryptanalysis | Conference |
Volume | ISSN | Citations |
6498 | 0302-9743 | 37 |
PageRank | References | Authors |
1.84 | 9 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Hamid Mala | 1 | 173 | 18.78 |
Mohammad Dakhilalian | 2 | 154 | 13.63 |
Vincent Rijmen | 3 | 2183 | 229.70 |
Mahmoud Modarres-Hashemi | 4 | 60 | 6.36 |