Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/14388
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kara, Orhun | - |
dc.date.accessioned | 2024-05-05T14:57:10Z | - |
dc.date.available | 2024-05-05T14:57:10Z | - |
dc.date.issued | 2024 | - |
dc.identifier.issn | 1300-0632 | - |
dc.identifier.issn | 1300-0632 | - |
dc.identifier.uri | https://doi.org/10.55730/1300-0632.4072 | - |
dc.identifier.uri | https://search.trdizin.gov.tr/en/yayin/detay/1240292/lower-data-attacks-on-advanced-encryption-standard | - |
dc.description.abstract | The Advanced Encryption Standard (AES) is one of the most commonly used and analyzed encryption algorithms. In this work, we present new combinations of some prominent attacks on AES, achieving new records in data requirements among attacks, utilizing only $2^4 and 2^{16}$ chosen plaintexts (CP) for 6-round and 7-round AES- 192/256, respectively. One of our attacks is a combination of a meet-in-the-middle (MiTM) attack with a square attack mounted on 6-round AES-192/256 while another attack combines an MiTM attack and an integral attack, utilizing key space partitioning technique, on 7-round AES-192/256. Moreover, we illustrate that impossible differential (ID) attacks can be viewed as the dual of MiTM attacks in certain aspects which enables us to recover the correct key using the meet-in-the-middle (MiTM) technique instead of sieving through all potential wrong keys in our ID attack. Furthermore, we introduce the constant guessing technique in the inner rounds which significantly reduces the number of key bytes to be searched. The time and memory complexities of our attacks remain marginal. | en_US |
dc.description.sponsorship | TÜBİTAK 1001 Project, (121E228) | en_US |
dc.language.iso | en | en_US |
dc.publisher | Turkiye Klinikleri | en_US |
dc.relation.ispartof | Turkish Journal of Electrical Engineering and Computer Sciences | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Advanced Encryption Standard | en_US |
dc.subject | Block cipher | en_US |
dc.subject | cryptanalysis | en_US |
dc.subject | encryption | en_US |
dc.subject | meet-in-the-middle attack | en_US |
dc.subject | square attack | en_US |
dc.title | Lower data attacks on Advanced Encryption Standard | en_US |
dc.type | Article | en_US |
dc.institutionauthor | Kara, Orhun | - |
dc.department | Izmir Institute of Technology | en_US |
dc.identifier.volume | 32 | en_US |
dc.identifier.issue | 2 | en_US |
dc.identifier.startpage | 338 | en_US |
dc.identifier.endpage | 357 | en_US |
dc.identifier.wos | WOS:001189049200002 | - |
dc.identifier.scopus | 2-s2.0-85188960607 | - |
dc.relation.publicationcategory | Makale - Ulusal Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.identifier.doi | 10.55730/1300-0632.4072 | - |
dc.authorscopusid | 23396967100 | - |
dc.identifier.trdizinid | 1240292 | - |
dc.identifier.wosquality | Q4 | - |
dc.identifier.scopusquality | Q3 | - |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.openairetype | Article | - |
crisitem.author.dept | 04.02. Department of Mathematics | - |
Appears in Collections: | Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection TR Dizin İndeksli Yayınlar / TR Dizin Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.