AES Other attacks

It is clear that so far, none of the attacks carried out against full-AES has been successful, these attacks usually focus on reducing rounds. Many authors claim that none of the following types of attacks have been more effective than an exhaustive-key search:
- Linear cryptanalysis
- Differential Cryptanalysis
- Truncated diferencials
- Interpolation attacks
- Square attack
However, the ordered structure and the deep mathematical basis that AES uses, make it an object of study for new attacks proposals such as algebraic attacks. These attacks consist on propose an equation system, and with the unknowns of the system, it can deduce the key; one of the advantages of this type of attack, is the small number of known texts needed.
In 2002, Asiacrypt made a publication of Nicolas Courtois and Josef Pieprzyk [1] where they propose a theoretical model of AES, which ensure characterization it as a quadratic equations system, the system consists on
Other known publications are:
- Impossible Differentials Attack: there is an attack of this type on
rounds of AES, requiring chosen plaintext, encryptions, bytes of memory, precalculus steps. These conditions were improved in [3] and [4] to achieve an attack on rounds of AES. - Square Attack: is an attack aimed at a type of Rijndael algorithm, it has been designed based on bytes structures. Just the first such attack was made on the predecessor algorithm called Square. This attack can break Rijndael on
rounds, which may be upgraded to attack on rounds of AES-256 with plaintexts, related keys and encryptions [5]. - Collision Attack: it tries to find two inputs that produce the same hash value, i.e., a hash collision. This attack affects all versions of AES,
, and with rounds [6].
## References
- Nicolas C, Josef P. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. ASIACRYPT ‘02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology (2002), pp. 267-287.
- http://www.cryptosystem.net/aes/
- J H C, M K, K K, J L, S K. Improved Impossible Differential Cryptanalysis of Rijndael and Crypton. ICISC (2001) LNCS 2288: pp. 39-49.
- Raphael CP, M U S. Generalised impossible differentials of advanced encryption standard. IEE Electronics Letters (2001) Vol. 37, Issue 14: pp. 896-898.
- N F, J K, S L, B S, M S, D W, D W, D W. Improved cryptanalysis of Rijndael. FSE 00, LNCS 1978, pp. 213-230.
- H G, M M. A collision Attack on 7 rounds of Rijndael. AES3papers, pp. 2-11.
Enjoy Reading This Article?
Here are some more articles you might like to read next: