About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Book chapter · Conference paper

Security of the AES with a Secret S-Box

Edited by Leander, Gregor

From

Department of Applied Mathematics and Computer Science, Technical University of Denmark1

Cryptology, Department of Applied Mathematics and Computer Science, Technical University of Denmark2

How does the security of the AES change when the S-box is replaced by a secret S-box, about which the adversary has no knowledge? Would it be safe to reduce the number of encryption rounds? In this paper, we demonstrate attacks based on integral cryptanalysis which allow to recover both the secret key and the secret S-box for respectively four, five, and six rounds of the AES.

Despite the significantly larger amount of secret information which an adversary needs to recover, the attacks are very efficient with time/data complexities of 217/216, 238/240 and 290/264, respectively. Another interesting aspect of our attack is that it works both as chosen plaintext and as chosen ciphertext attack.

Surprisingly, the chosen ciphertext variant has a significantly lower time complexity in the attacks on four and five round, compared to the respective chosen plaintext attacks.

Language: English
Publisher: Springer
Year: 2015
Pages: 175-189
Proceedings: 22nd International Workshop on Fast Software Encryption (FSE 2015)International Conference on Fast Software Encryption
ISBN: 3662481154 , 3662481162 , 9783662481158 and 9783662481165
ISSN: 16113349 and 03029743
Types: Book chapter and Conference paper
DOI: 10.1007/978-3-662-48116-5_9
ORCIDs: Tiessen, Tyge , Knudsen, Lars Ramkilde and Kölbl, Stefan

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis