Skip to Main content Skip to Navigation
Journal articles

Revisiting AES Related-Key Differential Attacks with Constraint Programming

Abstract : The Advanced Encryption Standard (AES) is one of the most studied symmetric encryption schemes. During the last years, several attacks have been discovered in different adversarial models. In this paper, we focus on related-key differential attacks, where the adversary may introduce differences in plaintext pairs and also in keys. We show that Constraint Programming (CP) can be used to model these attacks, and that it allows us to efficiently find all optimal related-key differential characteristics for AES-128, AES-192 and AES-256. In particular, we improve the best related-key differential for the whole AES-256 and give the best related-key differential on 10 rounds of AES-192, which is the differential trail with the longest path. Those results allow us to improve existing related-key distinguishers, basic related-key attacks and q-multicollisions on AES-256.
Complete list of metadatas

Cited literature [12 references]  Display  Hide  Download

https://hal.archives-ouvertes.fr/hal-01827727
Contributor : Christine Solnon <>
Submitted on : Monday, July 2, 2018 - 3:57:54 PM
Last modification on : Wednesday, March 4, 2020 - 12:28:03 PM
Document(s) archivé(s) le : Monday, October 1, 2018 - 7:10:39 AM

File

ipl2018.pdf
Files produced by the author(s)

Identifiers

Citation

David Gérault, Pascal Lafourcade, Marine Minier, Christine Solnon. Revisiting AES Related-Key Differential Attacks with Constraint Programming. Information Processing Letters, Elsevier, 2018, 139, pp.24-29. ⟨10.1016/j.ipl.2018.07.001⟩. ⟨hal-01827727⟩

Share

Metrics

Record views

364

Files downloads

562