论文部分内容阅读
利用AES密钥编排的弱点,检查简化AES-192和AES-256抵抗相关密钥矩形攻击的能力.发现两种新的攻击方法:基于4个相关密钥针对9轮AES-192和基于4个相关密钥针对10轮AES-256的新攻击.文中的研究结果表明:利用4个相关密钥,对9轮AES-192进行的相关密钥矩形攻击其数据复杂度约为2~(101)选择明文数据量、计算复杂度约为2~(174.8)次加密;利用4个相关密钥,对10轮AES-256进行的相关密钥矩形攻击其数据复杂度约为2~(97.5)选择明文数据量、计算复杂度约为2~(254)次加密.与已有的结果相比较,这些新分析在攻击9轮AES-192和10轮AES-256中所需的相关密钥数量是最少的.此外,文中还改进了FSE2007论文中针对10轮AES-192的相关密钥矩形攻击,使其所需的数据量和计算复杂度均有所降低.
Taking advantage of the weaknesses in AES keychecking, examining the ability to simplify AES-192 and AES-256 counter-attack-related key rectangle attacks, two new attack methods were found: based on 4 associated keys for 9 rounds of AES-192 and based on 4 The results show that using four correlation keys, the data complexity of the related key rectangle attack on nine rounds of AES-192 is about 2 ~ (101) The number of plaintexts is chosen, and the computational complexity is about 2 ~ (174.8). Using four correlation keys, the complexity of the related key rectangle attack on 10 rounds of AES-256 is about 2 ~ (97.5) The amount of plaintext data and computational complexity is about 2 to 254. Compared with the existing results, the number of relevant keys required by these new analyzes in attacking 9-round AES-192 and 10-round AES-256 is In addition, the article also improves the related key rectangle attack on 10-round AES-192 in the paper of FSE2007, which reduces the amount of data and computational complexity.