{"title":"AES的下推攻击","authors":"M. El-Fotouh, K. Diepold","doi":"10.1109/SECURWARE.2009.50","DOIUrl":null,"url":null,"abstract":"We present a new idea on chosen plaintext cryptanalysis, where we can bypass some of the cipher's encryption rounds at its beginning. To illustrate this idea, we developed the Pushdown attack. This attack can increase the strength of some chosen plaintext attacks. We applied the Pushdown attack on AES and was able to achieve a 6-round attack that requires only 2$^{11}$ chosen plaintexts, this reduces the chosen plaintexts needed by the Square attack with a factor of 2$^{21}$.","PeriodicalId":382947,"journal":{"name":"2009 Third International Conference on Emerging Security Information, Systems and Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"The Pushdown Attack on AES\",\"authors\":\"M. El-Fotouh, K. Diepold\",\"doi\":\"10.1109/SECURWARE.2009.50\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We present a new idea on chosen plaintext cryptanalysis, where we can bypass some of the cipher's encryption rounds at its beginning. To illustrate this idea, we developed the Pushdown attack. This attack can increase the strength of some chosen plaintext attacks. We applied the Pushdown attack on AES and was able to achieve a 6-round attack that requires only 2$^{11}$ chosen plaintexts, this reduces the chosen plaintexts needed by the Square attack with a factor of 2$^{21}$.\",\"PeriodicalId\":382947,\"journal\":{\"name\":\"2009 Third International Conference on Emerging Security Information, Systems and Technologies\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-06-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Third International Conference on Emerging Security Information, Systems and Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECURWARE.2009.50\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Third International Conference on Emerging Security Information, Systems and Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECURWARE.2009.50","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
We present a new idea on chosen plaintext cryptanalysis, where we can bypass some of the cipher's encryption rounds at its beginning. To illustrate this idea, we developed the Pushdown attack. This attack can increase the strength of some chosen plaintext attacks. We applied the Pushdown attack on AES and was able to achieve a 6-round attack that requires only 2$^{11}$ chosen plaintexts, this reduces the chosen plaintexts needed by the Square attack with a factor of 2$^{21}$.