Abstract

AES is the most widely used symmetric cipher. Many cryptographic primitives are designed following the structure of AES, called AES-like ciphers. Mixture differential cryptanalysis is a structural cryptanalysis technique for AES, which gave the best key recovery attack on 5-round AES in the chosen-plaintext setting and attacks with practical data and memory complexities on round-reduced AES. In this paper, we study the mixture differential attacks on 6 rounds of AES-like ciphers, and propose two improved attacks towards optimizing time and data complexities respectively. As an application to AES, we give the improved mixture differential attack on 6 rounds of AES-128 with time complexity 262.74, reducing by a factor of 210.26 compared with the previous mixture differential attack. For low data complexity, we show the improved 6-round mixture differential attack on AES-128 with data complexity 224.05, reducing by a factor of about 4. We also apply two attacks to 6 super-rounds of Saturnin, one of the second-round candidates in NIST lightweight cryptography standardization process, which is the first security evaluation of Saturnin against mixture differential cryptanalysis.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call