Impossible differential attack on seven-round AES-128

55Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A specific class of differential cryptanalytic approach, named as impossible differential attack, has been successfully applied to several symmetric cryptographic primitives in particular encryption schemes such as Advanced Encryption Standard (AES). Such attacks exploit differences that are impossible at some intermediate state of the cipher algorithm. The best-known impossible differential attack against AES-128 has applied to six rounds. An attack on AES-128 up to seven rounds is proposed. The proposed attack requires 2115.5 chosen plaintexts and 2109 bytes of memory and performs 2119 seven-round AES encryptions. This is also the best-known attack on a reduced version of the AES-128 till now. © 2008 The Institution of Engineering and Technology.

Cite

CITATION STYLE

APA

Bahrak, B., & Aref, M. R. (2008). Impossible differential attack on seven-round AES-128. IET Information Security, 2(2), 28–32. https://doi.org/10.1049/iet-ifs:20070078

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free