Please use this identifier to cite or link to this item: https://hdl.handle.net/11147/14388
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKara,O.-
dc.date.accessioned2024-05-05T14:57:10Z-
dc.date.available2024-05-05T14:57:10Z-
dc.date.issued2024-
dc.identifier.issn1300-0632-
dc.identifier.urihttps://doi.org/10.55730/1300-0632.4072-
dc.identifier.urihttps://hdl.handle.net/11147/14388-
dc.description.abstractThe Advanced Encryption Standard (AES) is one of the most commonly used and analyzed encryption algorithms. In this work, we present new combinations of some prominent attacks on AES, achieving new records in data requirements among attacks, utilizing only 24 and 216 chosen plaintexts (CP) for 6-round and 7-round AES-192/256, respectively. One of our attacks is a combination of a meet-in-the-middle (MiTM) attack with a square attack mounted on 6-round AES-192/256 while another attack combines an MiTM attack and an integral attack, utilizing key space partitioning technique, on 7-round AES-192/256. Moreover, we illustrate that impossible differential (ID) attacks can be viewed as the dual of MiTM attacks in certain aspects which enables us to recover the correct key using the meet-in-the-middle (MiTM) technique instead of sieving through all potential wrong keys in our ID attack. Furthermore, we introduce the constant guessing technique in the inner rounds which significantly reduces the number of key bytes to be searched. The time and memory complexities of our attacks remain marginal. © 2024 Turkiye Klinikleri. All rights reserved.en_US
dc.description.sponsorshipTÜBİTAK 1001 Project, (121E228)en_US
dc.language.isoenen_US
dc.publisherTurkiye Kliniklerien_US
dc.relation.ispartofTurkish Journal of Electrical Engineering and Computer Sciencesen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectAdvanced Encryption Standarden_US
dc.subjectBlock cipheren_US
dc.subjectcryptanalysisen_US
dc.subjectencryptionen_US
dc.subjectmeet-in-the-middle attacken_US
dc.subjectsquare attacken_US
dc.titleLower data attacks on Advanced Encryption Standarden_US
dc.typeArticleen_US
dc.institutionauthorKara,O.-
dc.departmentIzmir Institute of Technologyen_US
dc.identifier.volume32en_US
dc.identifier.issue2en_US
dc.identifier.startpage338en_US
dc.identifier.endpage357en_US
dc.identifier.wosWOS:001189049200002-
dc.identifier.scopus2-s2.0-85188960607-
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.identifier.doi10.55730/1300-0632.4072-
dc.authorscopusid23396967100-
dc.identifier.wosqualityQ4-
dc.identifier.scopusqualityQ3-
item.grantfulltextnone-
item.openairetypeArticle-
item.languageiso639-1en-
item.cerifentitytypePublications-
item.fulltextNo Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
Appears in Collections:Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Show simple item record



CORE Recommender

Page view(s)

10
checked on Jul 15, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.