Please use this identifier to cite or link to this item: https://hdl.handle.net/11147/14361
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKara, Orhun-
dc.date.accessioned2024-05-05T14:57:02Z-
dc.date.available2024-05-05T14:57:02Z-
dc.date.issued2024-
dc.identifier.issn0161-1194-
dc.identifier.issn1558-1586-
dc.identifier.urihttps://doi.org/10.1080/01611194.2024.2320362-
dc.identifier.urihttps://hdl.handle.net/11147/14361-
dc.description.abstractIn this work, we examine the security of the 8-round AES, under the known plaintext attack scenario, a type of cryptographic attack in which an attacker has access to the plaintext and corresponding ciphertext pairs. We present an innovative impossible differential (ID) attack technique, which utilizes a specific ID characteristic, to perform the first known plaintext attack on the 8-round AES with a 256-bit key. Additionally, we propose a new attack methodology, known as the Square Impossible Differential (SID) attack, to enhance the effectiveness of the ID attacks on AES in chosen ciphertext or plaintext scenarios. The SID attack is a combination of a square attack and an ID attack. Our methodology introduces various new approaches, including the key indicator vectors, eliminating the key candidate through the Meet-in-The-Middle technique and mounting the guess and determine attack through the hash tables for the two-round decryption of one column of AES while determining the subkeys constituting the impossible differential characteristic for a given plaintext/ciphertext difference pair. Our approach demonstrates lower computational complexity compared to previous methods, and our analysis shows that the complexities of our known plaintext attack and SID attack are estimated to be 2220 and 2209, respectively.en_US
dc.description.sponsorshipThe Scientific and Technological Research Council of Turkeyen_US
dc.description.sponsorshipNo Statement Availableen_US
dc.language.isoenen_US
dc.publisherTaylor & Francis incen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectAdvanced Encryption Standard (AES)en_US
dc.subjectblock cipheren_US
dc.subjectcryptanalysisen_US
dc.subjectimpossible differential attacken_US
dc.subjectimpossible differential characteristicen_US
dc.subjectsquare attacken_US
dc.titleSquare impossible differential attack and security of AES in known plaintext scenarioen_US
dc.typeArticleen_US
dc.institutionauthorKara, Orhun-
dc.departmentIzmir Institute of Technologyen_US
dc.identifier.wosWOS:001196622500001-
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.identifier.doi10.1080/01611194.2024.2320362-
dc.identifier.wosqualityQ2-
dc.identifier.scopusqualityN/A-
item.fulltextNo Fulltext-
item.grantfulltextnone-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
item.openairetypeArticle-
crisitem.author.dept04.02. Department of Mathematics-
Appears in Collections:WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Show simple item record



CORE Recommender

Page view(s)

84
checked on Nov 18, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.