An analysis of a sparse linearization attack on the advanced encryption standard
- UNCG Author/Contributor (non-UNCG co-authors, if there are any, appear on document)
- Stephanie D. Rednour (Creator)
- Institution
- The University of North Carolina at Greensboro (UNCG )
- Web Site: http://library.uncg.edu/
- Advisor
- Shan Suthaharan
Abstract: "Since Rijndael was accepted as the new Advanced Encryption Standard by the NIST, several techniques have been developed to attack it. One of the more controversial techniques is a relatively new mathematically based attack known as Extended Sparse Linearization, or XSL. Estimates for a successful attack on AES using XSL are extremely large (best estimate is 2100 encryptions), so no attempt to implement the attack has yet been made. To show that the attack is viable, a reduced version of AES can be implemented and a modification of the XSL attack can be used on the reduced version. I have implemented the reduced version of AES, referred to as rAES, as well as the attack. In this document it will be shown that the attack fails. Since the attack failed on the reduced version, the result can be extended to show that it cannot be made on the full version either. "--Abstract from author supplied metadata.
An analysis of a sparse linearization attack on the advanced encryption standard
PDF (Portable Document Format)
9673 KB
Created on 5/1/2006
Views: 3204
Additional Information
- Publication
- Thesis
- Language: English
- Date: 2006
- Keywords
- Rijndael, Advanced Encryption Standard, NIST, Extended Sparse Linearization, attack technique
- Subjects
- Data encryption (Computer science)
- Computer networks--Security measures