Paper 2009/374
Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds
Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, and Adi Shamir
Abstract
AES is the best known and most widely used block cipher. Its three
versions (AES-128, AES-192, and AES-256) differ in their key sizes
(128 bits, 192 bits and 256 bits) and in their number of rounds (10,
12, and 14, respectively). In the case of AES-128, there is no known attack which is faster than the
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- AEScryptanalysisrelated key attackspractical attacks
- Contact author(s)
- adi shamir @ weizmann ac il
- History
- 2009-08-19: last of 2 revisions
- 2009-08-03: received
- See all versions
- Short URL
- https://ia.cr/2009/374
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2009/374, author = {Alex Biryukov and Orr Dunkelman and Nathan Keller and Dmitry Khovratovich and Adi Shamir}, title = {Key Recovery Attacks of Practical Complexity on {AES} Variants With Up To 10 Rounds}, howpublished = {Cryptology {ePrint} Archive, Paper 2009/374}, year = {2009}, url = {https://eprint.iacr.org/2009/374} }