2001
DOI: 10.1007/3-540-44706-7_15
|View full text |Cite
|
Sign up to set email alerts
|

Improved Cryptanalysis of Rijndael

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
297
0
1

Year Published

2005
2005
2013
2013

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 288 publications
(322 citation statements)
references
References 5 publications
1
297
0
1
Order By: Relevance
“…Also, K (3) 1,1 can derive from the knowledge of K (1) 1,1 (belongs to key path C) and K (2) 1,4 , then K (5) 1,1 is also leaked from K (3) 1,1 and K (4) 1,4 . By above observation we can reduce the memory complexity by a factor of 2 24 with a similar method mentioned in [6]. We rearrange the key bytes in the key search phase.…”
Section: Algorithm 52mentioning
confidence: 93%
“…Also, K (3) 1,1 can derive from the knowledge of K (1) 1,1 (belongs to key path C) and K (2) 1,4 , then K (5) 1,1 is also leaked from K (3) 1,1 and K (4) 1,4 . By above observation we can reduce the memory complexity by a factor of 2 24 with a similar method mentioned in [6]. We rearrange the key bytes in the key search phase.…”
Section: Algorithm 52mentioning
confidence: 93%
“…It supports three different key sizes: 128, 192, and 256 bits, denoted as AES-128, AES-192, and AES-256, respectively. Various cryptanalytic results were published on AES, and until recently, the best attacks presented non-random properties of 7/10/10 rounds (out of 10/12/14 rounds) of AES-128/192/256 [14,16,23,18,22]. A breakthrough in analysis of AES have been the results [10,9].…”
Section: Aesmentioning
confidence: 99%
“…The supplied 256-bit key is divided into 8 words of 32 bits each (W [0], W [1], · · · , W [7]). To generate the 15 subkeys of 128 bits (which consist of 60 words of 32 bits), the following algorithm is used: -For i = 8 till i = 59 do the following:…”
Section: Description Of Aes-256mentioning
confidence: 99%