z-logo
open-access-imgOpen Access
Related‐key rectangle cryptanalysis of Rijndael‐160 and Rijndael‐192
Author(s) -
Wang Qingju,
Liu Zhiqiang,
Toz Deniz,
Varici Kerem,
Gu Dawu
Publication year - 2015
Publication title -
iet information security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 34
eISSN - 1751-8717
pISSN - 1751-8709
DOI - 10.1049/iet-ifs.2014.0380
Subject(s) - advanced encryption standard , key schedule , boomerang attack , byte , computer science , cryptanalysis , arithmetic , algorithm , linear cryptanalysis , cryptography , mathematics , differential cryptanalysis , computer hardware
In this study, the authors present the first related‐key rectangle cryptanalysis of Rijndael‐160/160 and Rijndael‐192/192. The author's attack on Rijndael‐160/160 covers eight rounds. The attack complexities are 2 126.5 chosen plaintexts, 2 129.28 8‐round Rijndael‐160/160 encryptions and 2 132.82 bytes. Their attack on Rijndael‐192/192 covers ten rounds. It requires 2 179 chosen plaintexts, 2 181.09 10‐round Rijndael‐192/192 encryptions and 2 185.59 bytes memory. These are the currently best cryptanalytic results on Rijndael‐160/160 and Rijndael‐192/192 in terms of the number of attacked rounds. Furthermore, their results show that the slow diffusion in the key schedule of Rijndael makes it a target for this type of analysis.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here