logo

SCIENCE CHINA Information Sciences, Volume 60, Issue 9: 099101(2017) https://doi.org/10.1007/s11432-016-0417-7

Single key recovery attacks on reduced AES-192 and Kalyna-128/256

More info
  • ReceivedJun 21, 2016
  • AcceptedSep 8, 2016
  • PublishedDec 19, 2016

Abstract


Funded by

National Natural Science Foundation of China(61373142)

High Technology Field of ``Action Plan for Scientific and Technological Innovation\" in Shanghai(16511101400)

National Natural Science Foundation of China(61572125)


Acknowledgment

Acknowledgments

This work was supported by National Natural Science Foundation of China (Grant Nos. 61572125, 61373142), High Technology Field of ``Action Plan for Scientific and Technological Innovation" in Shanghai (Grant No. 16511101400).


References

[1] Demirci H, Sel\c{c}uk A A. A meet-in-the-middle attack on 8-round AES. In: Fast Software Encyption. Berlin: Springer-Verlag, 2008. 116--126. Google Scholar

[2] Demirci H, Ta\c{s}kin I, \c{C}oban M, et al. Improved meet-in-the-middle attacks on AES. In: Proceedings of International Conference on Cryptology in India. Berlin: Springer-Verlag, 2009. 144--156. Google Scholar

[3] Dunkelman O, Keller N, Shamir A. Improved single-key attacks on 8-round AES-192 and AES-256. In: Advances in Cryptology---ASIACRYPT 2010. Berlin: Springer-Verlag, 2010. 158--176. Google Scholar

[4] Derbez P, Fouque P A, Jean J. Improved key recovery attacks on reduced round AES in the single-key setting. In: Advances in Cryptology---EUROCRYPT 2013. Berlin: Springer-Verlag, 2013. 371--187. Google Scholar

[5] Li L B, Jia K T, Wang X Y. Improved single-key attacks on 9-round AES-192/256. In: Fast Software Encyption. Berlin: Springer-Verlag, 2015. 127--146. Google Scholar

[6] Li R J, Jin C H. Meet-in-the-middle attacks on 10-round AES-256. Designs Codes Cryptogr, 2015, 80: 459-471 Google Scholar

[7] Huang J L, Lai X J. Revisiting key schedule's diffusion in relation with round function's diffusion. Designs Codes Cryptogr, 2014, 73: 85-103 CrossRef Google Scholar

[8] Li L, Wu W L, Zheng Y F. Automatic search for key-bridging technique: applications to LBlock and TWINE. In: Fast Software Encryption. Berlin: Springer-Verlag, 2016. 247--267. Google Scholar

[9] AlTawy R, Abdelkhalek A, Youssef A M. A meet-in-the-middle attack on reduced-round Kalyna-b/2b. Ieice Trans Inf Syst, 2016, E99.D: 1246-1250 CrossRef Google Scholar

[10] Akshima, Chang D H, Ghosh M, et al. Single key recovery attacks on 9-round Kalyna-128/256 and Kalyna-256/512. In: Information Security and Cryptology---ICISC 2015. Berlin: Springer-Verlag, 2015. 119--135. Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1