A Quantitative Study of Advanced Encryption Standard Performance as it Relates to Cryptographic Attack Feasibility
Citations
158 citations
6 citations
1 citations
Cites methods from "A Quantitative Study of Advanced En..."
...A quantum computer that has implemented Grover’s algorithm would reduce the key-space to 2(64), which is easily breakable by modern standards [16]....
[...]
...The Biclique technique is the only known general attack against AES, and only reduces the AES-256 key size to 2 [16]....
[...]
References
9,647 citations
1,009 citations
"A Quantitative Study of Advanced En..." refers background in this paper
...Biham and Shamir (1993) discovered and published the new technique, which become known as differential cryptanalysis....
[...]
...By 1993, however, the concern of the key length and the potential attack complexity reduction of differential cryptanalysis entered the literature (Biham & Shamir, 1993)....
[...]
...Since these attacks were known even prior to attacks becoming feasible against DES, they were appropriately considered during the AES selection process (Baudron et al., 1999; Biham & Shamir, 1993)....
[...]
...A month before publication, Coppersmith, one of the members of the design team announced that they were aware of differential cryptanalysis in 1974 and took design precautions to partially mitigate the method but kept it a secret for the sake of national security (Biham & Shamir, 1993)....
[...]
803 citations
[...]
711 citations
560 citations