TY - GEN
T1 - The pushdown attack on AES
AU - El-Fotouh, Mohamed Abo
AU - Diepold, Klaus
PY - 2009
Y1 - 2009
N2 - We present a new idea on chosen plaintext cryptanalysis, where we can bypass some of the cipher's encryption rounds at its beginning. To illustrate this idea, we developed the Pushdown attack. This attack can increase the strength of some chosen plaintext attacks. We applied the Pushdown attack on AES and was able to achieve a 6-round attack that requires only 211 chosen plaintexts, this reduces the chosen plaintexts needed by the Square attack with a factor of 221.
AB - We present a new idea on chosen plaintext cryptanalysis, where we can bypass some of the cipher's encryption rounds at its beginning. To illustrate this idea, we developed the Pushdown attack. This attack can increase the strength of some chosen plaintext attacks. We applied the Pushdown attack on AES and was able to achieve a 6-round attack that requires only 211 chosen plaintexts, this reduces the chosen plaintexts needed by the Square attack with a factor of 221.
UR - http://www.scopus.com/inward/record.url?scp=70449464388&partnerID=8YFLogxK
U2 - 10.1109/SECURWARE.2009.50
DO - 10.1109/SECURWARE.2009.50
M3 - Conference contribution
AN - SCOPUS:70449464388
SN - 9780769536682
T3 - Proceedings - 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009
SP - 280
EP - 285
BT - Proceedings - 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009
T2 - 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009
Y2 - 18 June 2009 through 23 June 2009
ER -