Fast Chosen-Key Distinguish Attacks on Round-Reduced AES-192

  • Chunbo Zhu
  • , Gaoli Wang*
  • , Boyu Zhu
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

The open-key attack is a very popular research topic in the symmetric-key community recently. In this paper, we focus on the security of AES-192 in one of its settings, namely the chosen-key setting. First, thanks to the linear relations between most of AES-192 subkeys, we construct an 8-round chosen-key distinguishers for it using the meet-in-the-middle idea and the SuperSbox technique. Then we turn this distinguisher into a key-recovery attack with a time complexity of one 8-round AES-192 encryption. Using the same approaches and with more efforts on exploiting the weak key schedule of this variant, 9-round chosen-key distinguishers is constructed and the master key is recovered afterwards at the cost of one 9-round AES-192 encryption. These results have been experimentally confirmed and two examples can be found in the appendix. While our work may not pose a threat to the security of AES-192 in a traditional way as those single-key recovery attacks do, we believe it do prove a non-trivial weakness in its key schedule to some extent and thus undermines its expectation as an ideal building block for hash functions.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 24th Australasian Conference, ACISP 2019, Proceedings
EditorsJulian Jang-Jaccard, Fuchun Guo
PublisherSpringer Verlag
Pages573-587
Number of pages15
ISBN (Print)9783030215477
DOIs
StatePublished - 2019
Event24th Australasian Conference on Information Security and Privacy, ACISP 2019 - Christchurch, New Zealand
Duration: 3 Jul 20195 Jul 2019

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11547 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference24th Australasian Conference on Information Security and Privacy, ACISP 2019
Country/TerritoryNew Zealand
CityChristchurch
Period3/07/195/07/19

Keywords

  • AES
  • Chosen-key distinguisher
  • Key recovery
  • Practical attacks

Fingerprint

Dive into the research topics of 'Fast Chosen-Key Distinguish Attacks on Round-Reduced AES-192'. Together they form a unique fingerprint.

Cite this