不可能差分攻击AES中的新密钥筛选算法

New Key-Sieving Algorithm in Impossible Differential Attacks on AES

  • 摘要: 提出了一种不可能差分攻击AES的新密钥筛选算法,该算法首先利用表查询技术筛掉一部分错误密钥,再使用分别征服攻击技术筛选剩余的密钥。研究结果表明,该算法在时间复杂度函数选择恰当的自变量时,时间复杂度低于已有的密钥筛选方法。同时利用该算法改进了INDOCRYPT2008上针对AES的最新不可能差分攻击,给出了时间复杂度曲线,并且得出最佳点。攻击7轮AES-128、7轮AES-192、7轮AES-256、8轮AES-256在保持数据量不变的情况下,存储访问次数分别由2117.2、2118.8、2118.8、2229.7降低为2116.35、2116.54、2116.35、2228.21。

     

    Abstract: A new key-sieving algorithm used in impossible differential attacks on advanced encryption standard (AES) is proposed. In the new algorithm, table look-up technique is firstly applied to eliminate some error keys, and then a divide-and-conquer technique is adopted to sieve the others. It is shown that the new algorithm gains some advantage over previously published key-sieving algorithms with respect to the time complexity when proper independent variables are chosen in the function of the time complexity. Moreover, we improve the impossible differential attacks on AES proposed in INDOCRYPT2008 by means of the new algorithm, meanwhile the curves of time complexity are drawn and the best points are obtained. The memory accesses of attacks on 7-round AES-128, 7-round AES-192, 7-round AES-256, and 8-round AES-256 are reduced to 2116.35, 2116.54, 2116.35, and 2228.21 from 2117.2, 2118.8, 2118.8, and 2229.7, respectively, and in the meanwhile the data complexity keeps unchanged.

     

/

返回文章
返回