Download PDF

IET Information Security

Publication date: 2015-09-01
Pages: 266 - 276
Publisher: Institute of Engineering Technology IET

Author:

Wang, Qingju
Liu, Zhiqiang ; Toz, Deniz ; Varici, Kerem ; Gu, Dawu

Keywords:

Science & Technology, Technology, Computer Science, Information Systems, Computer Science, Theory & Methods, Computer Science, cryptography, computational complexity, related-key rectangle cryptanalysis, attack complexities, encryptions, Rijndael-192, 192, Rijndael-160, 160, ATTACKS, 0803 Computer Software, 0804 Data Format, 0906 Electrical and Electronic Engineering, Strategic, Defence & Security Studies, 4604 Cybersecurity and privacy

Abstract:

© The Institution of Engineering and Technology 2015. In this study, the authors present the first related-key rectangle cryptanalysis of Rijndael-160/160 and Rijndael- 192/192. The author's attack on Rijndael-160/160 covers eight rounds. The attack complexities are 2< /sup>126.5< //sup> chosen plaintexts, 2< /sup>129.28< //sup> 8-round Rijndael-160/160 encryptions and 2< /sup>132.82< //sup> bytes. Their attack on Rijndael-192/192 covers ten rounds. It requires 2< /sup>179< //sup> chosen plaintexts, 2< /sup>181.09< //sup> 10-round Rijndael-192/192 encryptions and 2< /sup>185.59< //sup> bytes memory. These are the currently best cryptanalytic results on Rijndael-160/160 and Rijndael-192/192 in terms of the number of attacked rounds. Furthermore, their results show that the slow diffusion in the key schedule of Rijndael makes it a target for this type of analysis.