JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2018, Vol. 53 ›› Issue (7): 39-45.doi: 10.6040/j.issn.1671-9352.0.2017.465

Previous Articles     Next Articles

A meet-in-the-middle attack on 10-round AES-128

XU Li-dong, WANG Ming-qiang*   

  1. School of Mathematics, Shandong University, Jinan 250100, Shandong, China
  • Received:2017-09-13 Online:2018-07-20 Published:2018-07-03

Abstract: Some relationship between different adjacent round keys of AES-128 was discovered. Combining this relationship with the principle of the 5-round distinguisher presented by Hüseyin Demirci and Ali Aydın Selçuk in 2008, an 8-round distinguisher was proposed. Based on this distinguisher, a meet-in-the-middle attack on 10-round AES-128 was designed. And, this distinguisher can save a considerable memory space in the precomputation step.

Key words: Rijndael, meet-in-the-middle cryptanalysis, AES, key expansion algorithm

CLC Number: 

  • TP309
[1] DEMIRCI H, SELCUK A A. A meet-in-the-middle attack on 8-round AES[C] // Fast Software Encryption, International Workshop, FSE 2008. Lausanne: DBLP, 2008:116-126.
[2] DAEMEN J, RIJMEN V. AES proposal: rijndael[C] // The First AES Candidate Conference, [S.l.] :[s.n.] ,1998.
[3] GILBERT H, MINIER M. A collisions attack on the 7-rounds rijndael[C] // Aes Candidate Conference, [S.l.] :[s.n.] , 2000: 230-241.
[4] DUNKELMAN O, KELLER N, SHAMIR A. Improved single-key attacks on 8-round AES-192 and AES-256[J]. Journal of Cryptology, 2016, 28(3):397-422.
[5] LI R, JIN C. Meet-in-the-middle attacks on 10-round AES-256[J]. 5Designs, Codes and Cryptography6, 2016, 80(3):459-471.
[6] 胡弘坚,金晨辉,李信然. 改进的7轮AES-128的不可能差分攻击[J]. 密码学报,2015, 2(1):92-100. HU Hongjian, JIN Chenhui, LI Xinran. Improved impossible differential attack on 7-round AES-128[J]. Journal of Cryptologic Research, 2015, 2(1):92-100.
[1] ZHANG Wen-yu and ZHANG Hai-na . Improved collision attack on 7 round AES-192 [J]. J4, 2007, 42(4): 6-09 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!