A Meet-in-the-Middle Attack on 8-Round AES
From MaRDI portal
Publication:3525664
DOI10.1007/978-3-540-71039-4_7zbMATH Open1154.68391OpenAlexW1571067952MaRDI QIDQ3525664FDOQ3525664
Authors: H. Demirci, Ali Aydın Selçuk
Publication date: 18 September 2008
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-71039-4_7
Recommendations
- Meet-in-the-middle attack on 8 rounds of the AES block cipher under 192 key bits
- A meet-in-the-middle attack on 10-round AES-128
- Meet-in-the-middle attacks on 10-round AES-256
- Improved meet-in-the-middle attacks on 7 and 8-round ARIA-192 and ARIA-256
- Improved meet-in-the-middle attacks on AES
- Improved single-key attacks on 8-round AES-192 and AES-256
- Improved single-key attacks on 8-round AES-192 and AES-256
- Exhausting Dmirci-Selçuk meet-in-the-middle attacks against reduced-round AES
- Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
Cites Work
- Title not available (Why is that?)
- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
- Provable security against a differential attack
- A cryptanalytic time-memory trade-off
- Title not available (Why is that?)
- Selected Areas in Cryptography
- Related-Key Boomerang and Rectangle Attacks
- Fast Software Encryption
- The block cipher \textsc{Square}
- Title not available (Why is that?)
- Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192
- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
- Selected Areas in Cryptography
- Impossible differential cryptanalysis of 7-round advanced encryption standard (AES)
- Advanced Encryption Standard – AES
- Topics in Cryptology – CT-RSA 2006
Cited In (60)
- Meet-in-the-middle attacks on AES with value constraints
- Related-tweak impossible differential cryptanalysis of reduced-round \texttt{TweAES}
- Quantum boomerang attacks and some applications
- Improved meet-in-the-middle attacks on nine rounds of the AES-192 block cipher
- Feistel-like structures revisited: classification and cryptanalysis
- New representations of the AES key schedule
- Ghidle: efficient large-state block ciphers for post-quantum security
- Related-cipher attacks: applications to Ballet and ANT
- Automatic Demirci-Selçuk meet-in-the-middle attack on SKINNY with key-bridging
- The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
- Automatic search of attacks on round-reduced AES and applications
- Quantum meet-in-the-middle attack on Feistel construction
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- The exchange attack: how to distinguish six rounds of AES with \(2^{88.2}\) chosen plaintexts
- Differential meet-in-the-middle cryptanalysis
- The (related-key) impossible boomerang attack and its application to the AES block cipher
- Improved meet-in-the-middle attacks on AES
- Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512
- Improved attacks on reduced-round Camellia-128/192/256
- Quantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AES
- A meet-in-the-middle attack on 10-round AES-128
- General model of the single-key meet-in-the-middle distinguisher on the word-oriented block cipher
- Universal forgery and key recovery attacks on ELmD authenticated encryption algorithm
- Exhausting Dmirci-Selçuk meet-in-the-middle attacks against reduced-round AES
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Meet-in-the-middle attacks on 10-round AES-256
- The effects of the omission of last round's MixColumns on AES
- SPF: a new family of efficient format-preserving encryption algorithms
- Transposition of AES key schedule
- Improved truncated differential distinguishers of AES with concrete S-box
- Tweaking AES
- Meet-in-the-middle preimage attacks on sponge-based hashing
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES
- New insights on AES-like SPN ciphers
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities
- Improved Meet-in-the-Middle Distinguisher on Feistel Schemes
- Improved Impossible Differential Attacks on Large-Block Rijndael
- The \texttt{Deoxys} AEAD family
- Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
- Key recovery attacks on reduced-round Joltik-BC in the single-key setting
- Automatic search of meet-in-the-middle and impossible differential attacks
- An improved preimage attack against \texttt{HAVAL-3}
- New representations of the AES key schedule
- Exploiting non-full key additions: full-fledged automatic Demirci-Selçuk meet-in-the-middle cryptanalysis of SKINNY
- Key structures: improved related-key boomerang attack against the full AES-256
- Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles
- Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher
- Revisiting key schedule's diffusion in relation with round function's diffusion
- A single-key attack on the full GOST block cipher
- New Impossible Differential Attacks on AES
- New Demiric–Selçuk meet-in-the-middle attacks on Misty and Feistel schemes
- Improved single-key attacks on 8-round AES-192 and AES-256
- Meet-in-the-middle attacks on reduced-round Hierocrypt-3
- Extended meet-in-the-middle attacks on some Feistel constructions
- A single-key attack on the full GOST block cipher
- Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE
- Meet-in-the-middle attack on 8 rounds of the AES block cipher under 192 key bits
- Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
- Quantum impossible differential attacks: applications to AES and SKINNY
This page was built for publication: A Meet-in-the-Middle Attack on 8-Round AES
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3525664)