{"title":"Improved Related-Key Boomerang Cryptanalysis of AES-256","authors":"H. Soleimany, Alireza Sharifi, Mohammadreza Aref","doi":"10.1109/ICISA.2010.5480302","DOIUrl":null,"url":null,"abstract":"A specific class of differential cryptanalytic approach, known as Related Key Boomerang Attack, has been successfully applied to several symmetric cryptographic primitives in particular encryption schemes such as Advanced Encryption Standard (AES). In this paper, we propose a new related-key boomerang attack on 8-round AES-256, a couple of ones on 9-round following the work of Gorski et al. In the first one, we attacked 8-round AES-256 with the time complexity of $2^{79}$ and the data complexity of $2^{59}$. The extended 8-round attack on 9-round AES-256 is more efficient than previous attacks from both time and data complexity perspectives.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"108 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Information Science and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISA.2010.5480302","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
A specific class of differential cryptanalytic approach, known as Related Key Boomerang Attack, has been successfully applied to several symmetric cryptographic primitives in particular encryption schemes such as Advanced Encryption Standard (AES). In this paper, we propose a new related-key boomerang attack on 8-round AES-256, a couple of ones on 9-round following the work of Gorski et al. In the first one, we attacked 8-round AES-256 with the time complexity of $2^{79}$ and the data complexity of $2^{59}$. The extended 8-round attack on 9-round AES-256 is more efficient than previous attacks from both time and data complexity perspectives.