International audienceThe Advanced Encryption Standard (AES) is one of the most studied symmetric encryption schemes. During the last years, several attacks have been discovered in different adversarial models. In this paper, we focus on related-key differential attacks, where the adversary may introduce differences in plaintext pairs and also in keys. We show that Constraint Programming (CP) can be used to model these attacks, and that it allows us to efficiently find all optimal related-key differential characteristics for AES-128, AES-192 and AES-256. In particular, we improve the best related-key differential for the whole AES-256 and give the best related-key differential on 10 rounds of AES-192, which is the differential trail with th...
International audienceFinding optimal related-key differential characteristics for a given cipher is...
International audienceFinding optimal related-key differential characteristics for a given cipher is...
International audienceWe describe Constraint Programming (CP) models to solve a cryptanalytic proble...
International audienceThe Advanced Encryption Standard (AES) is one of the most studied symmetric en...
International audienceThe Advanced Encryption Standard (AES) is one of the most studied symmetric en...
International audienceThe Advanced Encryption Standard (AES) is one of the most studied symmetric en...
International audienceCryptanalysis aims at testing the properties of encryption processes, and this...
International audienceCryptanalysis aims at testing the properties of encryption processes, and this...
International audienceCryptanalysis aims at testing the properties of encryption processes, and this...
International audienceThe Advanced Encryption Standard (AES) is one of the most studied symmetric en...
International audienceCryptanalysis aims at testing the properties of encryption processes, and this...
International audienceCryptanalysis aims at testing the properties of encryption processes, and this...
The Advanced Encryption Standard (AES) is considered to be the most important and widely deployed sy...
Search for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this...
International audienceSearch for different types of distinguishers are common tasks in symmetric-key...
International audienceFinding optimal related-key differential characteristics for a given cipher is...
International audienceFinding optimal related-key differential characteristics for a given cipher is...
International audienceWe describe Constraint Programming (CP) models to solve a cryptanalytic proble...
International audienceThe Advanced Encryption Standard (AES) is one of the most studied symmetric en...
International audienceThe Advanced Encryption Standard (AES) is one of the most studied symmetric en...
International audienceThe Advanced Encryption Standard (AES) is one of the most studied symmetric en...
International audienceCryptanalysis aims at testing the properties of encryption processes, and this...
International audienceCryptanalysis aims at testing the properties of encryption processes, and this...
International audienceCryptanalysis aims at testing the properties of encryption processes, and this...
International audienceThe Advanced Encryption Standard (AES) is one of the most studied symmetric en...
International audienceCryptanalysis aims at testing the properties of encryption processes, and this...
International audienceCryptanalysis aims at testing the properties of encryption processes, and this...
The Advanced Encryption Standard (AES) is considered to be the most important and widely deployed sy...
Search for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this...
International audienceSearch for different types of distinguishers are common tasks in symmetric-key...
International audienceFinding optimal related-key differential characteristics for a given cipher is...
International audienceFinding optimal related-key differential characteristics for a given cipher is...
International audienceWe describe Constraint Programming (CP) models to solve a cryptanalytic proble...