The Exchange Attack and the Mixture Differential Attack Revisited: From the Perspective of Automatic Evaluation

Kexin Qiao*, Zhiyu Zhang, Zhongfeng Niu, Liehuang Zhu

*此作品的通讯作者

科研成果: 期刊稿件文章同行评审

4 引用 (Scopus)

摘要

Recent results show that the differential properties within quadruples boom as a new inspiration in cryptanalysis of Advanced Encryption Standard (AES)-like constructions. These methods include the exchange attack proposed in Asiacrypt'19, the mixture differential attack proposed in ToSC'18, etc., where the essential properties are obtained by manually scrutinizing the structures of the AES-like constructions. This paper presents a novel framework and an automatic tool based on mixed integer linear programming to search for mixture differential distinguishers for general constructions. This framework considers what equality patterns among quadruples can make a distinguisher and traces how the patterns propagate through cipher components with accurate probability estimation. With this tool, a 5-round AES distinguishing attack with lower complexity and more 6-round distinguishing attacks in the chosen plaintext scenarios are deduced. We prove that no exchange-type or mixture differential distinguisher exists for 7 and above rounds AES if the details of the Sbox and MixColumns matrix are not taken into account.

源语言英语
页(从-至)19-29
页数11
期刊Chinese Journal of Electronics
33
1
DOI
出版状态已出版 - 1 1月 2024

指纹

探究 'The Exchange Attack and the Mixture Differential Attack Revisited: From the Perspective of Automatic Evaluation' 的科研主题。它们共同构成独一无二的指纹。

引用此