Netinfo Security ›› 2020, Vol. 20 ›› Issue (4): 40-46.doi: 10.3969/j.issn.1671-1122.2020.04.005

Previous Articles     Next Articles

Impossible Differential Attacks on 9-Round Block Cipher Rijndael-192

DONG Xiaoli1(), SHANG Shuai1, CHEN Jie2   

  1. 1. School of Cyberspace Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China
    2. School of Telecommunication Engineering, Xidian University, Xi’an 710071, China
  • Received:2019-09-15 Online:2020-04-10 Published:2020-05-11
  • Contact: Xiaoli DONG E-mail:dxl_xaut@163.com

Abstract:

With high speed, easy standardization and easy implement in hardware and software, block cipher has a wide range of applications in the field of information security. It is necessary to study the security of block cipher. Impossible differential attack is one of the effective attack methods against block cipher. In this paper, we focus on impossible differential (ID) attacks on Rijndael-192. According to the property that the difference branch number of the MixColumns is 5, a new 5-round impossible differential is proposed; then based on this impossible differential, with property of S-box and the key schedule weakness, the key recovery on the 9-round Rijndael-192 is given. It is shown or the attack on 9-round Rijndael-192 with key size of 192, it requires data complexity of about 2176.6 chosen plaintexts ,time complexity of about 2188.2 encryptions and memory complexity of about 2120 blocks, which is better than previous known results in terms of the data, time and memory complexity; for the attack on 9-round Rijndael-192 with key size of 224 and 256, it requires data complexity of about 2178.2 chosen plaintexts, time complexity of about 2197.8 encryptions and memory complexity of about 2120 blocks,which is better than previous known results in terms of the data and memory complexity.

Key words: crypt analysis, block cipher, Rijndael, impossible differential attack

CLC Number: