The pushdown attack on AES

Mohamed Abo El-Fotouh, Klaus Diepold

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We present a new idea on chosen plaintext cryptanalysis, where we can bypass some of the cipher's encryption rounds at its beginning. To illustrate this idea, we developed the Pushdown attack. This attack can increase the strength of some chosen plaintext attacks. We applied the Pushdown attack on AES and was able to achieve a 6-round attack that requires only 211 chosen plaintexts, this reduces the chosen plaintexts needed by the Square attack with a factor of 221.

Original languageEnglish
Title of host publicationProceedings - 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009
Pages280-285
Number of pages6
DOIs
StatePublished - 2009
Event2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009 - Athens, Glyfada, Greece
Duration: 18 Jun 200923 Jun 2009

Publication series

NameProceedings - 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009

Conference

Conference2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009
Country/TerritoryGreece
CityAthens, Glyfada
Period18/06/0923/06/09

Fingerprint

Dive into the research topics of 'The pushdown attack on AES'. Together they form a unique fingerprint.

Cite this