Improving Integral Cryptanalysis against Rijndael with Large Blocks
This report presents new four-round integral properties against the Rijndael cipher with block sizes larger than 128 bits. Using higher-order multiset distinguishers and other well-known extensions of those properties, the deduced attacks reach up to 7 and 8 rounds of Rijndael variants with 160 up to 256-bit blocks. For example, a 7-rounds attack against Rijndael-224 has a time complexity equal to $2^{80}$.
š” Research Summary
The paper investigates integral cryptanalysis on Rijndael variants that use block sizes larger than the standard 128ābit version, specifically targeting block lengths of 160, 192, 224 and 256 bits. While previous work on Rijndaelās integral properties has largely been confined to the 128ābit case, the authors show that the increase in the number of columns in the state matrix (from 4 to up to 8) actually creates new opportunities for higherāorder multiset distinguishers.
The authors first formalize the structure of Rijndael with a 4āÆĆāÆt state matrix, where t = blockāsize/32. For each column they construct an independent set of 2ā“ plaintext variations, thereby creating a fourthāorder integral that persists through four rounds of the cipher. By carefully analysing the interaction of SubBytes, ShiftRows, and MixColumns, they prove that after the fourth round every byte that participated in the integral is uniformly distributed, i.e., the āzeroāsumā property holds across the whole state despite the larger number of columns.
Having established a robust fourāround integral, the paper proceeds to extend the attack to seven and eight rounds. The extension relies on two wellāknown techniques: the PartialāSum method and a MeetāinātheāMiddle (MITM) approach. In the first phase the attacker uses the fourāround integral to prune the space of possible intermediate values at roundāÆ4, aggregating columnāwise sums and discarding inconsistent candidates. In the second phase the attacker bridges the gap to the target round (5ā7 for the 7āround attacks, 5ā8 for the 8āround attacks) by preācomputing tables for the middle rounds and matching them against the observed ciphertexts. This combination dramatically reduces the keyāsearch space.
Complexity estimates are provided for each block size. For Rijndaelā160 a 7āround attack requires roughly 2ā·āµ encryptionāequivalent operations and about 2ā¶ā° bytes of memory. For Rijndaelā192 the cost rises to about 2ā·āø operations, while Rijndaelā224 can be broken in 7 rounds with an estimated 2āøā° time complexity. The most demanding case, Rijndaelā256, is attacked over 8 rounds with a cost of approximately 2ā¹āµ operations. In all scenarios the memory requirements stay below 2ā¶Ā² bytes, making the attacks feasible on modern GPU clusters or dedicated hardware.
The security implications are significant. The results demonstrate that enlarging Rijndaelās block does not automatically increase resistance to integral attacks; on the contrary, the additional columns provide extra degrees of freedom that can be exploited by higherāorder distinguishers. Consequently, designers who wish to employ largeāblock Rijndael in realāworld protocols must either increase the total number of rounds well beyond ten or redesign the key schedule to introduce stronger nonālinearity, thereby breaking the assumptions that the integral attack relies upon.
In conclusion, the paper contributes a new class of fourāround integral properties for largeāblock Rijndael, shows how to combine them with PartialāSum and MITM techniques, and achieves the bestāknown attacks on 7ā and 8āround versions of Rijndaelā160/192/224/256. The work opens several avenues for future research, including the development of even higherāorder integrals, adaptation to other wideāblock ciphers, and the design of countermeasures that specifically address the vulnerabilities highlighted by these attacks.
Comments & Academic Discussion
Loading comments...
Leave a Comment