An Analysis of XSL Applied to BES

نویسندگان

  • Chu-Wee Lim
  • Khoongming Khoo
چکیده

Currently, the only plausible attack on the Advanced Encryption System (AES) is the XSL attack over F256 through the Big Encryption System (BES) embedding. In this paper, we give an analysis of the XSL attack when applied to BES and conclude that the complexity estimate is too optimistic. For example, the complexity of XSL on BES-128 should be at least 2 instead of the value of 2 from current literature. Our analysis applies to the eprint version of the XSL attack, which is different from the compact XSL attack studied by Cid and Leurent at Asiacrypt 2005. Moreover, we study the attack on the BES embedding of AES, while Cid and Leurent studies the attack on AES itself. Thus our analysis can be considered as a parallel work, which together with Cid and Leurent’s study, disproves the effectiveness of both versions of the XSL attack against AES.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Analysis of the Compact XSL Attack on BES and Embedded SMS4

The XSL attack when applied on BES-128 has been shown to have an attack complexity of 2, which is faster than exhaustive search. However at FSE 2007, Lim and Khoo analyzed the eprint XSL attack on BES and showed that the attack complexity should be 2. Later at IEEE-YCS 2008, Qu and Liu counter-proposed that the compact XSL attack on BES-128 works and has complexity 2. In this paper, we point ou...

متن کامل

Application of Fuzzy Fault Tree Analysis on Oil and Gas Offshore Pipelines

Fault Tree Analysis (FTA) as a Probabilistic Risk Assessment (PRA) method is used to identify basic causes leading to an undesired event, to represent logical relation of these basic causes in leading to the event, and finally to calculate the probability of occurrence of this event. To conduct a quantitative FTA, one needs a fault tree along with failure data of the Basic Events (BEs). Someti...

متن کامل

The two be's of English

This  qualitative  study  investigates  the  uses  of  be  in  Contemporary  English.  Based  on  this  study, one  easy  claim  and  one  more  difficult  claim  are  proposed.  The  easy  claim  is  that  the  traditional distinction between be as a lexical verb and be as an auxiliary is faulty. In particular, 'copular-be', traditionally considered to be a lexical verb, is in fact a prototypi...

متن کامل

Algebraic Cryptanalysis of Aes: an Overview

In this paper, we examine algebraic attacks on the Advanced Encryption Standard (AES, also known as Rijndael). We begin with a brief review of the history of AES, followed by a description of the AES algorithm. We then discuss the problem of solving systems of multivariate quadratic equations over arbitrary fields (the MQ problem), as well as some recent general methods for solving it, namely r...

متن کامل

FOA: an XSL-FO Authoring Tool

FOA [Formatting Object Authoring] is an open-source authoring tool that applies rich styling to XML content. It allows the styling to be re-used across multiple documents. It also allows the author to build or import a library of style components. It is based on XSL-FO, the W3C-defined markup language, whose aim is to add rich styling to XML content, especially for paginated documents. The arch...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007