[Resource Topic] 2009/531: Super-Sbox Cryptanalysis: Improved Attacks for AES-like permutations

Welcome to the resource topic for 2009/531

Super-Sbox Cryptanalysis: Improved Attacks for AES-like permutations

Authors: Henri Gilbert, Thomas Peyrin


In this paper, we improve the recent rebound and start-from-the-middle attacks on AES-like permutations. Our new cryptanalysis technique uses the fact that one can view two rounds of such permutations as a layer of big Sboxes preceded and followed by simple affine transformations. The big Sboxes encountered in this alternative representation are named Super-Sboxes. We apply this method to two second-round SHA-3 candidates Grostl and ECHO, and obtain improvements over the previous cryptanalysis results for these two schemes. Moreover, we improve the best distinguisher for the AES block cipher in the known-key setting, reaching 8 rounds for the 128-bit version.

ePrint: https://eprint.iacr.org/2009/531

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .