Abstract

Recently, algebraic attacks have emerged as a new type of cryptographic attack on block ciphers. These attacks involve the formulation of a system of nonlinear equations that describe the secret keybits in terms of the input and output bits of the block cipher, which is then solved. Courtois and Pieprzyk have shown that that the AES-Rijndael block cipher can be written as an overdefined system of 8000 multivariate quadratic (MQ) equations with 1600 binary (2002). The estimated complexity for solving these equations requires O(2/sup 230/) steps. Recently, Murphy and Robshaw (2002) have shown how to embed Rijndael in a new extended 128-bit cipher, called BES (big encryption system). Within this simplified framework AES encryption can be described by a small and extremely sparse multivariate quadratic (MQ) system over GF(2/sup 8/). Key recovery requires the solution of a sparse MQ systems over GF(2/sup 8/) in approximately O(2/sup 108/) steps. This work presents a comparison of these two similar algebraic attacks and a detailed overview of the XL algorithm for solving MQ equations.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.