New types of cryptanalytic attacks using related keys
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
The Design of Rijndael
Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Differential Cryptanalysis of DES-like Cryptosystems
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Differential-Linear Cryptanalysis
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
The Rectangle Attack - Rectangling the Serpent
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Amplified Boomerang Attack against Reduced-Round SHACAL
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Improved Cryptanalysis of Rijndael
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Related Key Attacks on Reduced Round KASUMI
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Related-Key attacks on reduced rounds of SHACAL-2
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Secure Hash Standard - SHS: Federal Information Processing Standards Publication 180-4
Secure Hash Standard - SHS: Federal Information Processing Standards Publication 180-4
A Unified Approach to Related-Key Attacks
Fast Software Encryption
A Meet-in-the-Middle Attack on 8-Round AES
Fast Software Encryption
New Related-Key Boomerang Attacks on AES
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Reflection Cryptanalysis of Some Ciphers
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
A Cryptanalytic View of the NSA's Skipjack Block Cipher Design
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Attacking 9 and 10 Rounds of AES-256
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Improved Meet-in-the-Middle Attacks on AES
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Improved related-key impossible differential attacks on reduced-round AES-192
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Related-key rectangle attack on the full SHACAL-1
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Related-key rectangle attack on 43-round SHACAL-2
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Cryptanalysis of reduced versions of the HIGHT block cipher from CHES 2006
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
X-FCSR: a new software oriented stream cipher based upon FCSRs
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
The delicate issues of addition with respect to XOR differences
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Improving integral attacks against Rijndael-256 up to 9 rounds
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Pseudorandom functions and permutations provably secure against related-key attacks
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
The (related-key) impossible boomerang attack and its application to the AES block cipher
Designs, Codes and Cryptography
Related-key rectangle attack on 42-round SHACAL-2
ISC'06 Proceedings of the 9th international conference on Information Security
New cryptanalytic results on IDEA
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
A weak key class of XTEA for a related-key rectangle attack
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Differential and rectangle attacks on reduced-round SHACAL-1
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
A related-key rectangle attack on the full KASUMI
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Related-Key impossible differential attacks on 8-round AES-192
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
On the security of encryption modes of MD4, MD5 and HAVAL
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Related-key attacks on the full-round cobra-f64a and cobra-f64b
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
A simple related-key attack on the full SHACAL-1
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Related-key rectangle attacks on reduced AES-192 and AES-256
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Hi-index | 0.00 |
In this paper we propose a notion of related-key rectangle attack using 4 related keys. It is based on two consecutive related-key differentials which are independent of each other. Using this attack we can break SHACAL-1 with 512-bit keys up to 70 rounds out of 80 rounds and AES with 192-bit keys up to 8 rounds out of 12 rounds, which are faster than exhaustive search.