2014
DOI: 10.1049/iet-ifs.2012.0353
|View full text |Cite
|
Sign up to set email alerts
|

Biclique key recovery for ARIA‐256

Abstract: In this study, combining the biclique cryptanalysis with the meet-in-the-middle (MITM) attack, the authors present the first key recovery method for the full ARIA-256 faster than brute-force. The attack requires 2 80 chosen plaintexts, and the time complexity is about 2 255.2 full-round ARIA encryptions.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
1
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 7 publications
(12 reference statements)
0
1
0
Order By: Relevance
“…The only exception is biclique cryptanalysis which was used in 2011 to create the first attack faster than brute force on the full version of AES [Bogdanov et al 2011]. At the time, this new method inspired its straightforward application in many ciphers [C ¸oban et al 2012, Abed et al 2012, de Carvalho and Kowada 2020, as well as the development of variations to apply in others which were not as simple of a task [Khovratovich et al 2012, Chen andXu 2014].…”
Section: Introductionmentioning
confidence: 99%
“…The only exception is biclique cryptanalysis which was used in 2011 to create the first attack faster than brute force on the full version of AES [Bogdanov et al 2011]. At the time, this new method inspired its straightforward application in many ciphers [C ¸oban et al 2012, Abed et al 2012, de Carvalho and Kowada 2020, as well as the development of variations to apply in others which were not as simple of a task [Khovratovich et al 2012, Chen andXu 2014].…”
Section: Introductionmentioning
confidence: 99%
“…There had never been an attack faster than brute force for the full round AES until then. In the following years after its initial success, the method was applied to a variety of ciphers such as HIGHT [Hong et al 2011], TWINE [C ¸oban et al 2012], SQUARE [Mala 2014] and ARIA [Chen and Xu 2014]. However, besides Rijndael (the original name of the AES), Biclique Cryptanalysis was applied to no other AES finalist, until the year 2020 when de Carvalho and Kowada [de Carvalho and Kowada 2020] attacked Serpent-256.…”
Section: Introductionmentioning
confidence: 99%