The last Thursday, Vincent Rijmen announced a new clever attack on AES (and KASUMI) in a report posted to the Cryptology ePrint Archive: Practical-Titled Attack on AES-128 Using Chosen-Text Relations, http://eprint.iacr.org/2010/337

I believe the related-subkey model is an interesting model to look at and, with this email, I would like to solicit comments from the community about chosen-text relations attacks and their implications.

For example, this model might be pretty relevant while attacking white-box implementations of the target encryption algorithm with embedded secret key, assuming the ability to tamper with at least 1bit of the round output (debugging...).

A Fault Attack
In order to further solicit comments, I would like to contribute a fault attack construction based on chosen-text relations attack.

First, it is worth to note how the zero-query attack provided by chosen-text-relations-in-the-middle can be transformed into an attack with a single-query to both the encryption and decryption oracles. It is possible to do so by resuming the interrupted encryption after applying the specific difference delta to the state (ie, no rollback anymore) and querying the decryption oracle.

More specifically:
- halt the computer in the middle of execution of an encryption routine;
- apply the specific difference delta to the state;
- resume the encryption and output the ciphertext c*;
- query the decryption oracle with c* and retrieve the modified plaintext 
p*---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com

Reply via email to