Square Impossible Differential Attack and Security of Aes in Known Plaintext Scenario
Loading...
Date
Authors
Kara, Orhun
Journal Title
Journal ISSN
Volume Title
Publisher
Open Access Color
Green Open Access
Yes
OpenAIRE Downloads
OpenAIRE Views
Publicly Funded
No
Abstract
In this work, we examine the security of the 8-round AES, under the known plaintext attack scenario, a type of cryptographic attack in which an attacker has access to the plaintext and corresponding ciphertext pairs. We present an innovative impossible differential (ID) attack technique, which utilizes a specific ID characteristic, to perform the first known plaintext attack on the 8-round AES with a 256-bit key. Additionally, we propose a new attack methodology, known as the Square Impossible Differential (SID) attack, to enhance the effectiveness of the ID attacks on AES in chosen ciphertext or plaintext scenarios. The SID attack is a combination of a square attack and an ID attack. Our methodology introduces various new approaches, including the key indicator vectors, eliminating the key candidate through the Meet-in-The-Middle technique and mounting the guess and determine attack through the hash tables for the two-round decryption of one column of AES while determining the subkeys constituting the impossible differential characteristic for a given plaintext/ciphertext difference pair. Our approach demonstrates lower computational complexity compared to previous methods, and our analysis shows that the complexities of our known plaintext attack and SID attack are estimated to be 2220 and 2209, respectively.
Description
Keywords
Advanced Encryption Standard (AES), block cipher, cryptanalysis, impossible differential attack, impossible differential characteristic, square attack
Fields of Science
Citation
WoS Q
Scopus Q

OpenCitations Citation Count
N/A
Source
Volume
49
Issue
Start Page
128
End Page
152
PlumX Metrics
Captures
Mendeley Readers : 1
Web of Science™ Citations
2
checked on May 02, 2026
Page Views
167
checked on May 02, 2026
Downloads
3
checked on May 02, 2026
Google Scholar™


