New Related-Key Boomerang Attacks on AES

  • Authors:
  • Michael Gorski;Stefan Lucks

  • Affiliations:
  • Bauhaus-University Weimar, Germany;Bauhaus-University Weimar, Germany

  • Venue:
  • INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we present two new attacks on round reduced versions of the AES. We present the first application of the related-key boomerang attack on 7 and 9 rounds of AES-192. The 7-round attack requires only 218 chosen plaintexts and ciphertexts and needs 267.5 encryptions. We extend our attack to nine rounds of AES-192. This leaves to a data complexity of 267 chosen plaintexts and ciphertexts using about 2143.33 encryptions to break 9 rounds of AES-192.