TU Darmstadt / ULB / TUbiblio

Obtaining and solving systems of equations in key variables only for the small variants of AES

Bulygin, Stanislav ; Brickenstein, Michael (2010)
Obtaining and solving systems of equations in key variables only for the small variants of AES.
In: Mathematics in Computer science Special Issue "Symbolic Computation and Cryptography", 2 (3)
doi: 10.1007/s11786-009-0020-y
Artikel, Bibliographie

Kurzbeschreibung (Abstract)

This work is devoted to attacking the small scale variants of the Advanced Encryption Standard (AES) via systems that contain only the initial key variables. To this end, we introduce a system of equations that naturally arises in the AES, and then eliminate all the intermediate variables via normal form reductions. The resulting system in key variables only is solved then. We also consider a possibility to apply our method in the meet-in-the-middle scenario especially with several plaintext/ciphertext pairs. We elaborate on the method further by looking for subsystems which contain fewer variables and are overdetermined, thus facilitating solving the large system.

Typ des Eintrags: Artikel
Erschienen: 2010
Autor(en): Bulygin, Stanislav ; Brickenstein, Michael
Art des Eintrags: Bibliographie
Titel: Obtaining and solving systems of equations in key variables only for the small variants of AES
Sprache: Englisch
Publikationsjahr: März 2010
Titel der Zeitschrift, Zeitung oder Schriftenreihe: Mathematics in Computer science Special Issue "Symbolic Computation and Cryptography"
Jahrgang/Volume einer Zeitschrift: 2
(Heft-)Nummer: 3
DOI: 10.1007/s11786-009-0020-y
Kurzbeschreibung (Abstract):

This work is devoted to attacking the small scale variants of the Advanced Encryption Standard (AES) via systems that contain only the initial key variables. To this end, we introduce a system of equations that naturally arises in the AES, and then eliminate all the intermediate variables via normal form reductions. The resulting system in key variables only is solved then. We also consider a possibility to apply our method in the meet-in-the-middle scenario especially with several plaintext/ciphertext pairs. We elaborate on the method further by looking for subsystems which contain fewer variables and are overdetermined, thus facilitating solving the large system.

Freie Schlagworte: Secure Data;Algebraic attack, Meet-in-the-middle attack, AES, Gröbner basis, Normal form
ID-Nummer: TUD-CS-2008-1145
Fachbereich(e)/-gebiet(e): LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
LOEWE > LOEWE-Zentren
LOEWE
Hinterlegungsdatum: 30 Dez 2016 20:23
Letzte Änderung: 17 Mai 2018 13:02
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen