4 gap = goal(10 round) - present (7 round) = future (3 round)
5 gap/time = estimate at 1 year
6 software goal = http://hashcat.net/oclhashcat/
7 prediction method:
8 curl, elinks, word cluster, topic summaries
9 :
10 AES Cipher Keys Suitable for Efficient Side-Channel
11 Vulnerability Evaluation
12 Takaaki Mizuki, Yu-ichi Hayashi Tohoku University
13 Abstract
14 This paper investigates pairs of AES-128 cipher keys and
15 plaintexts which result in being “quiet” in the final round,
16 i.e., whose 128-bit State holds the same bit pattern
17 before and after Round 10.
18 HOLDS THE SAME BIT PATTERN BEFORE AND AFTER ROUND 10.
19 ...Because such quiet and noisy plaintexts make extreme actions
20 in the final round of the AES encryption, these AES-128 cipher keys
21 are quite useful for AES hardware designers to efficiently
22 evaluate the vulnerabilities of their products,
23 for instance, the performance of their side-channel attack
24 countermeasures.
25 Table 8: The Estimated SNR at various distances from the FPGA.
26 9 Conclusion
27 recent research has been adopting the idea that suitable plaintexts,
28 say those with rather small (but non-zero) Hamming distances
29 in the final round, are chosen for efficient side-channel attack evaluation.
30 there has not been any study that uses quiet plaintexts
31 (i.e., those with exactly-zero-Hamming distance) yet.
32 New Related-Key Boomerang Attacks on AES
33 Michael Gorski and Stefan Lucks, Bauhaus-University Weimar, Germany
34 Abstract. In this paper we present two new attacks on round reduced
35 versions of the AES. We present the first application of the related-key
36 boomerang attack on 7 and 9 rounds of AES-192. The 7-round attack
37 requires only 218 chosen plaintexts and ciphertexts and needs
38 267.5 encryptions. We extend our attack to nine rounds of AES-192.
39 This leaves to a data complexity of 267 chosen plaintexts and ciphertexts
40 using about 2143.33 encryptions to break 9 rounds of AES-192.
41 Conclusion
42 The AES remains still unbroken but we have shown that up to
43 7 rounds practical attacks are available yet.
44 7 ROUNDS PRACTICAL ATTACKS ARE AVAILABLE
2 prediction: 3 side-channel attack + boomerang attack 10 round >> AES-128 Broken
4 gap = goal(10 round) - present (7 round) = future (3 round) 5 gap/time = estimate at 1 year 6 software goal = http://hashcat.net/oclhashcat/
7 prediction method: 8 curl, elinks, word cluster, topic summaries 9 : 10 AES Cipher Keys Suitable for Efficient Side-Channel 11 Vulnerability Evaluation 12 Takaaki Mizuki, Yu-ichi Hayashi Tohoku University
13 Abstract 14 This paper investigates pairs of AES-128 cipher keys and 15 plaintexts which result in being “quiet” in the final round, 16 i.e., whose 128-bit State holds the same bit pattern 17 before and after Round 10. 18 HOLDS THE SAME BIT PATTERN BEFORE AND AFTER ROUND 10.
19 ...Because such quiet and noisy plaintexts make extreme actions 20 in the final round of the AES encryption, these AES-128 cipher keys 21 are quite useful for AES hardware designers to efficiently 22 evaluate the vulnerabilities of their products, 23 for instance, the performance of their side-channel attack 24 countermeasures. 25 Table 8: The Estimated SNR at various distances from the FPGA.
26 9 Conclusion 27 recent research has been adopting the idea that suitable plaintexts, 28 say those with rather small (but non-zero) Hamming distances 29 in the final round, are chosen for efficient side-channel attack evaluation. 30 there has not been any study that uses quiet plaintexts 31 (i.e., those with exactly-zero-Hamming distance) yet.
32 New Related-Key Boomerang Attacks on AES 33 Michael Gorski and Stefan Lucks, Bauhaus-University Weimar, Germany
34 Abstract. In this paper we present two new attacks on round reduced 35 versions of the AES. We present the first application of the related-key 36 boomerang attack on 7 and 9 rounds of AES-192. The 7-round attack 37 requires only 218 chosen plaintexts and ciphertexts and needs 38 267.5 encryptions. We extend our attack to nine rounds of AES-192. 39 This leaves to a data complexity of 267 chosen plaintexts and ciphertexts 40 using about 2143.33 encryptions to break 9 rounds of AES-192.
41 Conclusion 42 The AES remains still unbroken but we have shown that up to 43 7 rounds practical attacks are available yet. 44 7 ROUNDS PRACTICAL ATTACKS ARE AVAILABLE