The pushdown attack on AES

Mohamed Abo El-Fotouh, Klaus Diepold

Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

Abstract

We present a new idea on chosen plaintext cryptanalysis, where we can bypass some of the cipher's encryption rounds at its beginning. To illustrate this idea, we developed the Pushdown attack. This attack can increase the strength of some chosen plaintext attacks. We applied the Pushdown attack on AES and was able to achieve a 6-round attack that requires only 211 chosen plaintexts, this reduces the chosen plaintexts needed by the Square attack with a factor of 221.

OriginalspracheEnglisch
TitelProceedings - 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009
Seiten280-285
Seitenumfang6
DOIs
PublikationsstatusVeröffentlicht - 2009
Veranstaltung2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009 - Athens, Glyfada, Griechenland
Dauer: 18 Juni 200923 Juni 2009

Publikationsreihe

NameProceedings - 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009

Konferenz

Konferenz2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009
Land/GebietGriechenland
OrtAthens, Glyfada
Zeitraum18/06/0923/06/09

Fingerprint

Untersuchen Sie die Forschungsthemen von „The pushdown attack on AES“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren