Chen Shao-Zhen, Lu Lin-Zhen. Differential Enumeration Attack on ARIA[J]. Journal of Electronics & Information Technology, 2011, 33(7): 1770-1774. doi: 10.3724/SP.J.1146.2010.01292
Citation:
Chen Shao-Zhen, Lu Lin-Zhen. Differential Enumeration Attack on ARIA[J]. Journal of Electronics & Information Technology, 2011, 33(7): 1770-1774. doi: 10.3724/SP.J.1146.2010.01292
Chen Shao-Zhen, Lu Lin-Zhen. Differential Enumeration Attack on ARIA[J]. Journal of Electronics & Information Technology, 2011, 33(7): 1770-1774. doi: 10.3724/SP.J.1146.2010.01292
Citation:
Chen Shao-Zhen, Lu Lin-Zhen. Differential Enumeration Attack on ARIA[J]. Journal of Electronics & Information Technology, 2011, 33(7): 1770-1774. doi: 10.3724/SP.J.1146.2010.01292
The 4-round ARIA differential property is given, and the differential enumeration attack on 7-round and 8-round ARIA-256 is presented in this paper. The attacks need 256 chosen plaintexts. The attack on 7-round ARIA has the time complexity of 2238.2 7-round ARIA encryptions in the preprocessing phase and 2124.2 7-round ARIA encryptions in the processing phase. The attack on 8-round ARIA has the time complexity of 2238 8-round ARIA encryptions in the preprocessing phase and 2253.6 8-round ARIA encryptions in the processing phase.