Security

Automatic Search of Attacks on Round-Reduced AES and Applications

Download Now Free registration required

Executive Summary

In this paper, the authors describe versatile and powerful algorithms for searching guess-and-determine and meet-in-the-middle attacks on some byte-oriented symmetric primitives. To demonstrate the strength of these tools, they show that they allow to automatically discovering new attacks on round-reduced AES with very low data complexity, and to find improved attacks on the AES-based MACs Alpha-MAC and Pelican-MAC, and also on the AES-based stream cipher LEX. Finally, the tools can be used in the context of fault attacks. These algorithms exploit the algebraically simple byte-oriented structure of the AES. When the attacks found by the tool are practical, they have been implemented and validated experimentally.

  • Format: PDF
  • Size: 631.08 KB