Loading...
Search for: key-attack
0.004 seconds

    A related key attack on the feistel type block ciphers

    , Article International Journal of Network Security ; Volume 8, Issue 3 , 2009 , Pages 221-226 ; 1816353X (ISSN) Bagherzandi, A ; Salmasizadeh, M ; Mohajeri, J ; Sharif University of Technology
    Femto Technique Co., Ltd  2009
    Abstract
    In this paper we show that Biham's chosen key attack can be generalized to include any block cipher and we give a low complexity chosen key attack on any Feistel type ci-pher. Then we show that the irregularities in the shift pattern of DES key schedule algorithm is not sufficient for the cryptosystem to resist against related key attacks. We have realized our proposition by a counter example in which the E-box of DES is slightly modified whiles other components and among those, the shift pattern in key schedule algorithm is kept unchanged. We have ap-plied a new related key attack on the resulting DES-like cryptosystem and demonstrated that the security of the system decreases drastically  

    A related key attack on the feistel type block ciphers

    , Article German Journal of Agricultural Economics ; Volume 62, Issue SUPPL.1 , 2013 , Pages 221-226 ; 00021121 (ISSN) Bagherzandi, A ; Salmasizadeh, M ; Mohajeri, J ; Sharif University of Technology
    2013
    Abstract
    In this paper we show that Biham's chosen key attack can be generalized to include any block cipher and we give a low complexity chosen key attack on any Feistel type ci-pher. Then we show that the irregularities in the shift pattern of DES key schedule algorithm is not sufficient for the cryptosystem to resist against related key attacks. We have realized our proposition by a counter example in which the E-box of DES is slightly modified whiles other components and among those, the shift pattern in key schedule algorithm is kept unchanged. We have ap-plied a new related key attack on the resulting DES-like cryptosystem and demonstrated that the security of the system decreases drastically  

    9-Round attack on AES-256 by a 6-round property

    , Article Proceedings - 2010 18th Iranian Conference on Electrical Engineering, ICEE 2010, 11 May 2010 through 13 May 2010 ; 2010 , Pages 226-230 ; 9781424467600 (ISBN) Sharifi, A ; Soleimany, H ; Aref, M ; Sharif University of Technology
    Abstract
    In this paper, we propose a new 6-round Related-Key Impossible Differential property of AES-256 and two related-key impossible differential attacks on 7 and 9 round AES-256, based on the proposed property. The overall complexity of the proposed 7 round attack is decreased by the factor 217. This is for the first time that a Related-Key Impossible Differential attack on 9-round AES-256 is successful. Also this is the first related-key attack on 9-round AES-256 that needs only 2 keys. Although the data and time complexities of the attack are approximately code book and exhaustive search, but we think the proposed property will be useful in future research like boomerang and rectangle attacks