Mixture differential cryptanalysis: A new approach to distinguishers and attacks on round-reduced AES

60Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.

Abstract

At Eurocrypt 2017 the first secret-key distinguisher for 5-round AES-based on the “multiple-of-8” property-has been presented. Although it allows to distinguish a random permutation from an AES-like one, it seems rather hard to implement a key-recovery attack different than brute-force like using such a distinguisher. In this paper we introduce “Mixture Differential Cryptanalysis” on round-reduced AES-like ciphers, a way to translate the (complex) “multiple-of-8” 5-round distinguisher into a simpler and more convenient one (though, on a smaller number of rounds). Given a pair of chosen plaintexts, the idea is to construct new pairs of plaintexts by mixing the generating variables of the original pair of plaintexts. Here we theoretically prove that for 4-round AES the corresponding ciphertexts of the original pair of plaintexts lie in a particular subspace if and only if the corresponding pairs of ciphertexts of the new pairs of plaintexts have the same property. Such secret-key distinguisher-which is independent of the secret-key, of the details of the S-Box and of the MixColumns matrix (except for the branch number equal to 5)-can be used as starting point to set up new key-recovery attacks on round-reduced AES. Besides a theoretical explanation, we also provide a practical verification both of the distinguisher and of the attack.

Cite

CITATION STYLE

APA

Grassi, L. (2018). Mixture differential cryptanalysis: A new approach to distinguishers and attacks on round-reduced AES. IACR Transactions on Symmetric Cryptology, 2018(2), 133–160. https://doi.org/10.46586/tosc.v2018.i2.133-160

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free