The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
IDA(Impossible Differential Attack)는 충분한 일반 텍스트 쌍에서 추출된 불가능한 차등 특성을 사용하여 AES의 첫 번째 및 마지막 여러 라운드의 하위 키를 검색합니다. 본 논문에서는 7라운드 AES에 대한 일반적인 IDA를 제안한다. 이러한 공격은 7라운드와 6라운드의 올제로 열의 개수를 매개변수(α,β)로 취한다. 그리고 공격 과정에서 평문 개수와 암호화 횟수 사이의 trade-off 관계가 도출되는데, 이는 서로 다른 키 길이에 대해 (α,β)의 일부 값만 공격에 허용되도록 한다.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
부
Meiling ZHANG, Weiguo ZHANG, Jingmei LIU, Xinmei WANG, "General Impossible Differential Attack on 7-Round AES" in IEICE TRANSACTIONS on Fundamentals,
vol. E93-A, no. 1, pp. 327-330, January 2010, doi: 10.1587/transfun.E93.A.327.
Abstract: Impossible differential attack (IDA) uses impossible differential characteristics extracted from enough plaintext pairs to retrieve subkeys of the first and the last several rounds of AES. In this paper, a general IDA on 7-round AES is proposed. Such attack takes the number of all-zero columns of the 7th and the 6th round as parameters (α,β). And a trade-off relation between the number of plaintexts and times of encryptions in the process of the attack is derived, which makes only some values of (α,β) allowed in the attack for different key length.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E93.A.327/_p
부
@ARTICLE{e93-a_1_327,
author={Meiling ZHANG, Weiguo ZHANG, Jingmei LIU, Xinmei WANG, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={General Impossible Differential Attack on 7-Round AES},
year={2010},
volume={E93-A},
number={1},
pages={327-330},
abstract={Impossible differential attack (IDA) uses impossible differential characteristics extracted from enough plaintext pairs to retrieve subkeys of the first and the last several rounds of AES. In this paper, a general IDA on 7-round AES is proposed. Such attack takes the number of all-zero columns of the 7th and the 6th round as parameters (α,β). And a trade-off relation between the number of plaintexts and times of encryptions in the process of the attack is derived, which makes only some values of (α,β) allowed in the attack for different key length.},
keywords={},
doi={10.1587/transfun.E93.A.327},
ISSN={1745-1337},
month={January},}
부
TY - JOUR
TI - General Impossible Differential Attack on 7-Round AES
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 327
EP - 330
AU - Meiling ZHANG
AU - Weiguo ZHANG
AU - Jingmei LIU
AU - Xinmei WANG
PY - 2010
DO - 10.1587/transfun.E93.A.327
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E93-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2010
AB - Impossible differential attack (IDA) uses impossible differential characteristics extracted from enough plaintext pairs to retrieve subkeys of the first and the last several rounds of AES. In this paper, a general IDA on 7-round AES is proposed. Such attack takes the number of all-zero columns of the 7th and the 6th round as parameters (α,β). And a trade-off relation between the number of plaintexts and times of encryptions in the process of the attack is derived, which makes only some values of (α,β) allowed in the attack for different key length.
ER -