The Exchange Attack and the Mixture Differential Attack Revisited: From the Perspective of Automatic Evaluation

Kexin Qiao*, Zhiyu Zhang, Zhongfeng Niu, Liehuang Zhu

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

4 Citations (Scopus)

Abstract

Recent results show that the differential properties within quadruples boom as a new inspiration in cryptanalysis of Advanced Encryption Standard (AES)-like constructions. These methods include the exchange attack proposed in Asiacrypt'19, the mixture differential attack proposed in ToSC'18, etc., where the essential properties are obtained by manually scrutinizing the structures of the AES-like constructions. This paper presents a novel framework and an automatic tool based on mixed integer linear programming to search for mixture differential distinguishers for general constructions. This framework considers what equality patterns among quadruples can make a distinguisher and traces how the patterns propagate through cipher components with accurate probability estimation. With this tool, a 5-round AES distinguishing attack with lower complexity and more 6-round distinguishing attacks in the chosen plaintext scenarios are deduced. We prove that no exchange-type or mixture differential distinguisher exists for 7 and above rounds AES if the details of the Sbox and MixColumns matrix are not taken into account.

Original languageEnglish
Pages (from-to)19-29
Number of pages11
JournalChinese Journal of Electronics
Volume33
Issue number1
DOIs
Publication statusPublished - 1 Jan 2024

Keywords

  • Advanced Encryption Standard (AES)
  • Automatic search
  • Exchange attack
  • Mixed integer linear programming
  • Mixture differential cryptanalysis

Fingerprint

Dive into the research topics of 'The Exchange Attack and the Mixture Differential Attack Revisited: From the Perspective of Automatic Evaluation'. Together they form a unique fingerprint.

Cite this