Algebraic Analysis of AES
Carlos Cid
Information Security Group, Royal Holloway, University of London
ECRYPT II AES Day 18 Oct 2012
Algebraic Analysis of AES Carlos Cid
Algebraic Analysis of AES Carlos Cid Information Security Group, - - PowerPoint PPT Presentation
Algebraic Analysis of AES Carlos Cid Information Security Group, Royal Holloway, University of London ECRYPT II AES Day 18 Oct 2012 Algebraic Analysis of AES Carlos Cid Algebraic Analysis of AES AES is an algorithm with a simple and very
Algebraic Analysis of AES Carlos Cid
Algebraic Analysis of AES Carlos Cid
Algebraic Analysis of AES Carlos Cid
Algebraic Analysis of AES Carlos Cid
Algebraic Analysis of AES Carlos Cid
Algebraic Analysis of AES Carlos Cid
Algebraic Analysis of AES Carlos Cid
Algebraic Analysis of AES Carlos Cid
Algebraic Analysis of AES Carlos Cid
Algebraic Analysis of AES Carlos Cid
Algebraic Analysis of AES Carlos Cid
Algebraic Analysis of AES Carlos Cid
Algebraic Analysis of AES Carlos Cid
Algebraic Analysis of AES Carlos Cid
Algebraic Analysis of AES Carlos Cid
AES may have been broken. Serpent, too. Or maybe not. In either case, there’s no need to panic. Yet. But there might be soon. Maybe. ... Basically, the attack works by trying to express the entire algorithm as multivariate quadratic polynomials, and then using an innovative technique to treat the terms of those polynomials as individual variables. ... There are a bunch of minimization techniques, and several other clever tricks you can use to make the solution easier. (This is a gross oversimplification of the paper; read it for more detail.). ... These are amazing results. ... There was some buzz about the paper in the academic community, but it quickly died down. I believe the problem was that the paper was dense and hard to understand. The attack technique, something called XSL, was brand new. ... In any case, there’s no cause for alarm yet. These attacks can be no more implemented in the field than they can be tested in a lab....There’s so much security margin in these ciphers that the attacks are irrelevant. But there is call for worry. If the attack really works, it can only get better. My fear is that we could see
about ten years from now... The work is fascinating... ... We’re starting to see the new attack tools that work against some of the AES finalists. It’s an open question as to how long the tools will remain theoretical. But many cryptographers who previously felt good about AES are having second thoughts. Algebraic Analysis of AES Carlos Cid
Algebraic Analysis of AES Carlos Cid
Algebraic Analysis of AES Carlos Cid
Algebraic Analysis of AES Carlos Cid
Algebraic Analysis of AES Carlos Cid
Algebraic Analysis of AES Carlos Cid
Algebraic Analysis of AES Carlos Cid
Algebraic Analysis of AES Carlos Cid