[25179] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Status of attacks on AES?

daemon@ATHENA.MIT.EDU (John R. Black)
Wed May 10 19:14:30 2006

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Wed, 10 May 2006 10:01:57 -0600
From: "John R. Black" <John.Black@Colorado.EDU>
To: cryptography@metzdowd.com
In-Reply-To: <01c001c66f8f$b8ac1690$1d137cc8@microsof241b65>

On Thu, May 04, 2006 at 10:30:40AM -0500, Marcos el Ruptor wrote:
> 
> http://defectoscopy.com/forum/viewtopic.php?t=3
> 
> Expect new attacks soon enough.
> 
I skimmed this.  The start of the article says that after 3 rounds AES
achieves perfect diffusion?!

A simple square attack (that I teach in class in about 60 mins) recovers 
the key of 4-round AES with 256 chosen-plaintexts.  The six-round attack
isn't too much harder.

Square (the cipher that preceded Rijndael and is very similar) was 8 rounds
to get past the 6-round attack.  During the AES vetting process they went
to 10 rounds for extra assurance (as much as anyone gets assurances from
the black art of blockcipher design).

john//

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post