Skip to Main content Skip to Navigation

Cryptanalysis of Symmetric-Key Primitives Based on the AES Block Cipher

Jérémy Jean 1
1 CASCADE - Construction and Analysis of Systems for Confidentiality and Authenticity of Data and Entities
DI-ENS - Département d'informatique de l'École normale supérieure, Inria Paris-Rocquencourt, CNRS - Centre National de la Recherche Scientifique : UMR 8548
Abstract : In this thesis, we are interested in the cryptanalysis of some symmetric primitives using the structural concepts of the current encryption standard AES. We begin by an analysis of the AES itself in three different security models: the standard model, the related-key model and the open-key model. In the standard model, where the adversary tries to recover the secret key, we describe the best differential attacks, improving on the results previously published on this block cipher. Then, we conduct a structural analysis of the AES in the related-key model. We show impossibility results claiming that one cannot prove the security of the structure of the AES against differential cryptanalysis in that model. Finally, in the open-key model, we propose the first distinguisher for 9-round AES-128, which solves a long-lasting open problem in the symmetric community. In a second part, we scrutinize the application of the rebound technique to AES-based permutations. We show that it is possible to control one more round in the first of the two parts of this strategy, which improves the best known results on this type of permutation. This result solves the open problem consisting in increasing the total number of rounds that can be attacked thanks to this technique. We also discuss the possibility to relax some constraints in the second phase to increase its probability of success. This reduces all the time complexities of the results previously published using the rebound technique. We apply these improvements to the Grostl hash function and reach the best cryptanalysis to date on the internal permutation. Finally, we study the ECHO hash function and show how we can apply the rebound technique multiple times to attack more rounds of the internal permutation.
Document type :
Complete list of metadatas

Cited literature [171 references]  Display  Hide  Download
Contributor : Jérémy Jean <>
Submitted on : Thursday, November 28, 2013 - 4:19:00 PM
Last modification on : Thursday, October 29, 2020 - 3:01:16 PM
Long-term archiving on: : Monday, March 3, 2014 - 6:25:54 PM


  • HAL Id : tel-00911049, version 1



Jérémy Jean. Cryptanalysis of Symmetric-Key Primitives Based on the AES Block Cipher. Cryptography and Security [cs.CR]. Ecole Normale Supérieure de Paris - ENS Paris, 2013. English. ⟨tel-00911049⟩



Record views


Files downloads