Differential cryptanalysis of the data encryption standard
Differential cryptanalysis of the data encryption standard
The Design of Rijndael
Improved Impossible Differential Cryptanalysis of Rijndael and Crypton
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Miss in the Middle Attacks on IDEA and Khufu
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Improved Cryptanalysis of Rijndael
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Impossible differential cryptanalysis of 7-round advanced encryption standard (AES)
Information Processing Letters - Devoted to the rapid publication of short contributions to information processing
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Improved related-key impossible differential attacks on reduced-round AES-192
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
New results on impossible differential cryptanalysis of reduced AES
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
Related-key rectangle attacks on reduced AES-192 and AES-256
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Improved Meet-in-the-Middle Attacks on AES
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Impossible differential cryptanalysis on feistel ciphers with SP and SPS round functions
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Cryptanalysis of a generalized unbalanced feistel network structure
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
The (related-key) impossible boomerang attack and its application to the AES block cipher
Designs, Codes and Cryptography
Meet-in-the-middle attack on 8 rounds of the AES block cipher under 192 key bits
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Meet-in-the-middle preimage attacks on AES hashing modes and an application to whirlpool
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes
FSE'11 Proceedings of the 18th international conference on Fast software encryption
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Biclique cryptanalysis of the full AES
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Impossible differential attacks on reduced-round LBlock
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256
Journal of Systems and Software
Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware
Fundamenta Informaticae - Cryptology in Progress: 10th Central European Conference on Cryptology, Będlewo Poland, 2010
Zero correlation linear cryptanalysis with reduced data complexity
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
New observations on impossible differential cryptanalysis of reduced-round camellia
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Generalized Feistel networks revisited
Designs, Codes and Cryptography
Impossible differential cryptanalysis on tweaked E2
NSS'12 Proceedings of the 6th international conference on Network and System Security
Improved impossible differential attacks on large-block rijndael
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Optimization of secure embedded systems with dynamic task sets
Proceedings of the Conference on Design, Automation and Test in Europe
On computational complexity of impossible differential cryptanalysis
Information Processing Letters
Linear hulls with correlation zero and linear cryptanalysis of block ciphers
Designs, Codes and Cryptography
Hi-index | 0.00 |
In this paper we apply impossible differential attacks to reduced round AES. Using various techniques, including the early abort approach and key schedule considerations, we significantly improve previously known attacks due to Bahrak-Aref and Phan. The improvement of these attacks leads to better impossible differential attacks on 7-round AES-128 and AES-192, as well as to better impossible differential attacks on 8-round AES-256.