Sciweavers

CRYPTO
2011
Springer

Automatic Search of Attacks on Round-Reduced AES and Applications

12 years 4 months ago
Automatic Search of Attacks on Round-Reduced AES and Applications
In this paper, we describe versatile and powerful algorithms for searching guess-and-determine and meet-in-the-middle attacks on byte-oriented symmetric primitives. To demonstrate the strengh of these tool, we show that they allows to automatically discover new attacks on round-reduced AES with very low data complexity, and to find improved attacks on the AES-based MACs Alpha-MAC and Pelican-MAC, and also on the AES-based stream cipher LEX. Finally, the tools can be used in the context of fault attacks. These algorithms exploit the algebraically simple byte-oriented structure of the AES. When the attack found by the tool are practical, they have been implemented and validated.
Charles Bouillaguet, Patrick Derbez, Pierre-Alain
Added 18 Dec 2011
Updated 18 Dec 2011
Type Journal
Year 2011
Where CRYPTO
Authors Charles Bouillaguet, Patrick Derbez, Pierre-Alain Fouque
Comments (0)