Improved Related-Key Boomerang Cryptanalysis of AES-256


A specific class of differential cryptanalytic approach, known as Related Key Boomerang Attack, has been successfully applied to several symmetric cryptographic primitives in particular encryption schemes such as Advanced Encryption Standard (AES). In this paper, we propose a new related-key boomerang attack on 8-round AES-256, a couple of ones on 9-round following the work of Gorski et al. In the first one, we attacked 8-round AES-256 with the time complexity of $2^{79}$ and the data complexity of $2^{59}$. The extended 8-round attack on 9-round AES-256 is more efficient than previous attacks from both time and data complexity perspectives.

9 Figures and Tables

Cite this paper

@article{Soleimany2010ImprovedRB, title={Improved Related-Key Boomerang Cryptanalysis of AES-256}, author={Hadi Soleimany and Alireza Sharifi and Mohammadreza Aref}, journal={2010 International Conference on Information Science and Applications}, year={2010}, pages={1-7} }