Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/14361
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kara, Orhun | - |
dc.date.accessioned | 2024-05-05T14:57:02Z | - |
dc.date.available | 2024-05-05T14:57:02Z | - |
dc.date.issued | 2024 | - |
dc.identifier.issn | 0161-1194 | - |
dc.identifier.issn | 1558-1586 | - |
dc.identifier.uri | https://doi.org/10.1080/01611194.2024.2320362 | - |
dc.identifier.uri | https://hdl.handle.net/11147/14361 | - |
dc.description.abstract | In this work, we examine the security of the 8-round AES, under the known plaintext attack scenario, a type of cryptographic attack in which an attacker has access to the plaintext and corresponding ciphertext pairs. We present an innovative impossible differential (ID) attack technique, which utilizes a specific ID characteristic, to perform the first known plaintext attack on the 8-round AES with a 256-bit key. Additionally, we propose a new attack methodology, known as the Square Impossible Differential (SID) attack, to enhance the effectiveness of the ID attacks on AES in chosen ciphertext or plaintext scenarios. The SID attack is a combination of a square attack and an ID attack. Our methodology introduces various new approaches, including the key indicator vectors, eliminating the key candidate through the Meet-in-The-Middle technique and mounting the guess and determine attack through the hash tables for the two-round decryption of one column of AES while determining the subkeys constituting the impossible differential characteristic for a given plaintext/ciphertext difference pair. Our approach demonstrates lower computational complexity compared to previous methods, and our analysis shows that the complexities of our known plaintext attack and SID attack are estimated to be 2220 and 2209, respectively. | en_US |
dc.description.sponsorship | The Scientific and Technological Research Council of Turkey | en_US |
dc.description.sponsorship | No Statement Available | en_US |
dc.language.iso | en | en_US |
dc.publisher | Taylor & Francis inc | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Advanced Encryption Standard (AES) | en_US |
dc.subject | block cipher | en_US |
dc.subject | cryptanalysis | en_US |
dc.subject | impossible differential attack | en_US |
dc.subject | impossible differential characteristic | en_US |
dc.subject | square attack | en_US |
dc.title | Square impossible differential attack and security of AES in known plaintext scenario | en_US |
dc.type | Article | en_US |
dc.institutionauthor | Kara, Orhun | - |
dc.department | Izmir Institute of Technology | en_US |
dc.identifier.wos | WOS:001196622500001 | - |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.identifier.doi | 10.1080/01611194.2024.2320362 | - |
dc.identifier.wosquality | Q2 | - |
dc.identifier.scopusquality | N/A | - |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.openairetype | Article | - |
crisitem.author.dept | 04.02. Department of Mathematics | - |
Appears in Collections: | WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.