Skip to main content
Top
Published in: Designs, Codes and Cryptography 1-2/2017

15-04-2016

Improving impossible-differential attacks against Rijndael-160 and Rijndael-224

Author: Marine Minier

Published in: Designs, Codes and Cryptography | Issue 1-2/2017

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Impossible-differential attacks are a very efficient form of cryptanalysis against block ciphers. In this paper, we improve the existing impossible-differential attacks against Rijndael-160 and Rijndael-224.
Footnotes
1
Note that in many attacks and in the one presented here, the bit-conditions are not independent but considering a pairwise independence leads to overestimate the attack complexity.
 
Literature
1.
go back to reference Biham E., Biryukov A., Shamir A.: Cryptanalysis of Skipjackreduced to 31 rounds using impossible differentials. In: Advances in Cryptology—EUROCRYPT’99. Lecture Notes in Computer Science, vol. 1592, pp. 12–23. Springer, Berlin (1999). Biham E., Biryukov A., Shamir A.: Cryptanalysis of Skipjackreduced to 31 rounds using impossible differentials. In: Advances in Cryptology—EUROCRYPT’99. Lecture Notes in Computer Science, vol. 1592, pp. 12–23. Springer, Berlin (1999).
2.
go back to reference Boura C., Minier M., Naya-Plasencia M., Suder V.: Improved impossible differential attacks againstround-reduced LBlock. Cryptology ePrint Archive. Report 2014/279. http://eprint.iacr.org/ (2014). Boura C., Minier M., Naya-Plasencia M., Suder V.: Improved impossible differential attacks againstround-reduced LBlock. Cryptology ePrint Archive. Report 2014/279. http://​eprint.​iacr.​org/​ (2014).
3.
go back to reference Boura C., Naya-Plasencia M., Suder V.: Scrutinizing and improving impossible differential attacks: applications to CLEFIA, Camellia, LBlock and Simon. In: Advances in Cryptology—ASIACRYPT 2014. Lecture Notes in Computer Science, vol. 8873, pp. 179–199. Springer, Berlin (2014). Boura C., Naya-Plasencia M., Suder V.: Scrutinizing and improving impossible differential attacks: applications to CLEFIA, Camellia, LBlock and Simon. In: Advances in Cryptology—ASIACRYPT 2014. Lecture Notes in Computer Science, vol. 8873, pp. 179–199. Springer, Berlin (2014).
4.
go back to reference Daemen J., Rijmen V.: AES proposal: Rijndael. In: The First Advanced Encryption Standard Candidate Conference. NIST, Gaithersburg (1998). Daemen J., Rijmen V.: AES proposal: Rijndael. In: The First Advanced Encryption Standard Candidate Conference. NIST, Gaithersburg (1998).
5.
go back to reference Daemen J., Rijmen V.: The Design of Rijndael. Springer, Berlin (2002). Daemen J., Rijmen V.: The Design of Rijndael. Springer, Berlin (2002).
6.
go back to reference Federal Information Processing Standards Publication 197 (FIPS 197): Advanced Encryption Standard. U.S. Department of Commerce/NIST, Gaithersburg (2001). Federal Information Processing Standards Publication 197 (FIPS 197): Advanced Encryption Standard. U.S. Department of Commerce/NIST, Gaithersburg (2001).
7.
go back to reference Knudsen L.: DEAL—a 128-bit block cipher. Complexity 258(2), 216 (1998). Knudsen L.: DEAL—a 128-bit block cipher. Complexity 258(2), 216 (1998).
8.
go back to reference Li Y.-J., Wu W.-L.: Improved Integral Attacks on Rijndael. J. Inf. Sci. Eng. 27(6), 2031–2045 (2011). Li Y.-J., Wu W.-L.: Improved Integral Attacks on Rijndael. J. Inf. Sci. Eng. 27(6), 2031–2045 (2011).
9.
go back to reference Mala H., Dakhilalian M., Rijmen V., Modarres-Hashemi M.: Improved impossible differential cryptanalysis of 7-round AES-128. In: Progress in Cryptology—INDOCRYPT 2010. Lecture Notes in Computer Science, vol. 6498, pp. 282–291. Springer, Berlin (2010). Mala H., Dakhilalian M., Rijmen V., Modarres-Hashemi M.: Improved impossible differential cryptanalysis of 7-round AES-128. In: Progress in Cryptology—INDOCRYPT 2010. Lecture Notes in Computer Science, vol. 6498, pp. 282–291. Springer, Berlin (2010).
10.
go back to reference Wang Q., Gu D., Rijmen V., Jiazhe Chen Y.-L., Bogdanov A.: Improved impossible differential attacks on large-block Rijndael. In: Information Security and Cryptology—ICISC 2012. Lecture Notes in Computer Science, vol. 7839, pp. 126–140. Springer, Berlin (2012). Wang Q., Gu D., Rijmen V., Jiazhe Chen Y.-L., Bogdanov A.: Improved impossible differential attacks on large-block Rijndael. In: Information Security and Cryptology—ICISC 2012. Lecture Notes in Computer Science, vol. 7839, pp. 126–140. Springer, Berlin (2012).
11.
go back to reference Zhang L., Wu W., Park J.-H., Koo B., Yeom Y.: Improved impossible differential attacks on large-block Rijndael. In: Information Security—ISC 2008. Lecture Notes in Computer Science, vol. 5222, pp. 298–315. Springer, Berlin (2008). Zhang L., Wu W., Park J.-H., Koo B., Yeom Y.: Improved impossible differential attacks on large-block Rijndael. In: Information Security—ISC 2008. Lecture Notes in Computer Science, vol. 5222, pp. 298–315. Springer, Berlin (2008).
Metadata
Title
Improving impossible-differential attacks against Rijndael-160 and Rijndael-224
Author
Marine Minier
Publication date
15-04-2016
Publisher
Springer US
Published in
Designs, Codes and Cryptography / Issue 1-2/2017
Print ISSN: 0925-1022
Electronic ISSN: 1573-7586
DOI
https://doi.org/10.1007/s10623-016-0206-7

Other articles of this Issue 1-2/2017

Designs, Codes and Cryptography 1-2/2017 Go to the issue

Premium Partner