AES: Other attacks

Rate this item
(0 votes)
AES: Other attacks photo credit: Ryan Somma via photopin cc

It is clear that so far, none of the attacks carried out against full-AES has been successful, these attacks usually focus on reducing rounds. Many authors claim that none of the following types of attacks have been more effective than an exhaustive-key search:

  • Linear cryptanalysis
  • Differential Cryptanalysis
  • Truncated diferencials
  • Interpolation attacks
  • Square attack

However, the ordered structure and the deep mathematical basis that AES uses, make it an object of study for new attacks proposals such as algebraic attacks. These attacks consist on propose an equation system, and with the unknowns of the system, it can deduce the key; one of the advantages of this type of attack, is the small number of known texts needed.

In 2002, Asiacrypt made a publication of Nicolas Courtois and Josef Pieprzyk [1] where they propose a theoretical model of AES, which ensure characterization it as a quadratic equations system, the system consists on 8000 equations with 1600 binary variables, however, the attack failed in trying to break AES, as Courtois mentioned in [2]. In addition, several cryptography experts have commented that there are mathematics problems behind the attack, the authors have probably made a mistake, despite this, considering the orderly shape and the mathematical complete structure of AES, it is possible that this type of cryptanalysis can become one of the most powerful to break AES.

Other known publications are:

  • Impossible Differentials Attack: there is an attack of this type on 5 rounds of AES, requiring 229 chosen plaintext, 230 encryptions, 242 bytes of memory, 226 precalculus steps. These conditions were improved in [3] and [4] to achieve an attack on 6 rounds of AES.
  • Square Attack: is an attack aimed at a type of Rijndael algorithm, it has been designed based on bytes structures. Just the first such attack was made on the predecessor algorithm called "Square". This attack can break Rijndael on 6-7 rounds, which may be upgraded to attack on 9 rounds of AES-256 with 277 plaintexts, 256 related keys and 2224 encryptions [5].
  • Collision Attack: it tries to find two inputs that produce the same hash value, i.e., a hash collision. This attack affects all versions of AES, 128, 192 and 256 with 7 rounds [6].

 

References

  1. Nicolas C & Josef P. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology (2002), pp. 267-287.
  2. http://www.cryptosystem.net/aes/
  3. J H C, M K, K K, J L & S K. Improved Impossible Differential Cryptanalysis of Rijndael and Crypton. ICISC (2001) LNCS 2288: pp. 39-49.
  4. Raphael CP & M U S. Generalised impossible differentials of advanced encryption standard. IEE Electronics Letters (2001) Vol. 37, Issue 14: pp. 896-898.
  5. N F, J K, S L, B S, M S, D W, D W & D W. Improved cryptanalysis of Rijndael. FSE 00, LNCS 1978, pp. 213-230.
  6. H G & M M. A collision Attack on 7 rounds of Rijndael. AES3papers, pp. 2-11.
15853 Last modified on Thursday, 22 September 2016 19:50
More in this category:
Luis Sequeira

Luis Sequeira is an IT professional with experience in cloud environments, quality of service and network traffic analysis, who loves looking for solutions to engineering challenges, share knowledge. At work, the main challenge is to integrate different network and software technologies to provide solution in a wide range of areas, e.g., virtual network functions, machine learning, autonomous driving, robotics and augmented reality.

Website: https://www.luissequeira.com

17 comments

  • ask Comment Link
    ask 23 April 2015, 18:08
    Normally I do not learn article on blogs, but I
    wish to say that this write-up very pressured me to take a look at
    and do it! Your writing style has been amazed me.

    Thanks, quite great article.
  • Facebook Marketing Comment Link
    Facebook Marketing 24 April 2015, 04:12
    Do you have a spam problem on this blog; I also
    am a blogger, and I was wanting to know your situation; we have developed some nice procedures and we are looking to swap techniques with other folks, please shoot me an email if
    interested.
  • google apps login page Comment Link
    google apps login page 28 June 2015, 01:35
    It didn't make Larry and Sergey to end the project.

    If you find it a massive task to create an advertising
    and marketing plan, be sure you start small and build it up.
    Other search engines like google sprang up like mushrooms nevertheless it wasn't some time before Google had a stranglehold
    online, setting itself up via powerful algorithms because arbiter of website quality and importance.
  • wordpress Comment Link
    wordpress 18 July 2015, 21:32
    I'm gone to convey my little brother, that he should also pay a quick visit this website on regular basis to take updated from newest news.
  • ask Comment Link
    ask 23 July 2015, 08:06
    I constantly spent my half an hour to read this webpage's
    content daily along with a cup of coffee.
  • eebest8 fiverr Comment Link
    eebest8 fiverr 08 January 2018, 22:54
    "We are a group of volunteers and opening a new scheme in our community. Your web site provided us with valuable info to work on. You've done a formidable job and our whole community will be thankful to you."
  • What are focal reduce Comment Link
    What are focal reduce 10 January 2018, 23:13
    "Hi there! I know this is kinda off topic but I was wondering which blog platform are you using for this site? I'm getting tired of Wordpress because I've had issues with hackers and I'm looking at alternatives for another platform. I would be awesome if you could point me in the direction of a good platform."

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.