Computer Science ›› 2014, Vol. 41 ›› Issue (8): 197-201.doi: 10.11896/j.issn.1002-137X.2014.08.043

Previous Articles     Next Articles

Novel Method for Impossible Differential Cryptanalysis of 9-Round AES_256

HU Zhi-hua,QIN Zhong-ping and ZHANG Qing   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Through profound study of the 4-round encryption characteristics of advanced encryption standard (AES),a new 4-round differential path with an existing probability to of 2-30 has been derived.Based on this path,a novel method was proposed for impossible differential cryptanalysis of 9-round AES_256.The analysis method requires 295 pairs of chosen plaintexts,about 2163 words of memory and 2193 encryption/decryption computations.According to the analysis process,it was found that the confusing level of the MixColumns transformation in AES algorithm is insufficient,which provides a theoretical basis to improve the AES security.

Key words: AES_256,Impossible differential cryptanalysis,Differential character

[1] Daemen J,Rijmen V.The Design of Rijndael:AES—the Ad-vanced Encryption Standard[M].Berlin:Springer-Verlag,2002:31-148
[2] 刘景美,赵林森.高级加密标准AES-192的7轮不可能差分分析[J].华中科技大学学报:自然科学版,2010,8(12):73-76
[3] 董晓丽,胡予濮,陈杰.不可能差分分析8轮AES-256[J].武汉大学学报:信息科学版,2010,5(5):595-598
[4] Biham E,Keller N.Cryptanalysis of Reduced Variant s of Rijndael[EB/OL].http://csrc.nist.gov/encryption/aes/ round2/ conf3/ aes3papers.html,2000
[5] Cheon J H,Kim M,Kim K,et al.Improved Impossible Differential Cryptanalysis of Rijndael and Crypton[M].Berlin:Springer-Verlag,2002:39-49
[6] Phan R C W.Impossible Differential Cryptanalysis of 7-round Advanced Encryption Standard (AES)[J].Information Proces-sing Letters,2004,91(1):33-38
[7] 陈杰,张跃宇,胡予濮.一种新的6轮AES不可能差分密码分析方法[J].西安电子科技大学学报:自然科学版,2006,3(4):598-601
[8] 陈杰,胡予濮,张跃宇.不可能差分分析高级加密标准[J].中国科学:信息科学,2007,7(2):191-198
[9] Bahrak B,Aref M R.Impossible differential attack on seven-round AES-128[J].IET Information Security,2008,2(2):28-32
[10] Hamid M,Mohammad D,Vincent R.Improved Impossible Differential Cryptanalysis of 7-Round AES-128[M].Berlin:Sprin-ger-Verlag,2010:282-291
[11] Biryukov A,Dunkelman O,Keller N,et al.Key Recovery At-tacks of Practical Complexity on AES-256 Variants With Up To 10Rounds[C]∥Advances in Cryptology-EUROCRYPT.2010,0:299-319
[12] Biryukov A,Khovratovich D.Related-Key Cryptanalysis of theFull AES-192 and AES-256[C]∥ASIACRYPT.2009,5912:1-18
[13] Hu Zhi-Hua,Qin Zhong-Ping.Related Key Impossible Differential Cryptanalysis of AES_256[J].International Journal of Advancements in Computing Technology,2012,4(3):2233-9337
[14] Dunkelman O,Keller N,Shamir A.Improved Single-Key At-tacks on 8-Round AES-192 and AES-256[C]∥ASIACRYPT.2010,6477:158-176
[15] Demirci H,Ta ISkin,Mustafa C,et al.Improved Meet-in-the-Middle Attacks on AES[C]∥INDOCRYPT 2009.2009,5922:144-156
[16] 胡志华,覃中平.一种新的8轮AES_128不可能差分分析[J].小型微型计算机系统,2012,38(5):73-79

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!