How I broke AES (Advanced Encryption Standard) — if I did it

Speaker
Dr. W. D. Smith
Duration
1:04:31
Date
2 February 2009
Abstract
We describe a new simple but more powerful form of linear cryptanalysis. It appears to break AES (and undoubtedly other cryptosystems too, e.g. SKIPJACK).
*But the break is "nonconstructive".
*Even if this break is broken (due to the underlying models inadequately approximating the real world) we explain how AES still could contain "trapdoors" which would make cryptanalysis unexpectedly easy for anybody who knew the trapdoor.

We then discuss how to use the theory of BLECCs to build cryptosystems provably
*not containing trapdoors of this sort,
*secure against our strengthened form of linear cryptanalysis,
*secure against "differential" cryptanalysis,
*secure against D.J. Bernstein's timing attack.

Using this technique we prove a fundamental theorem: it is possible to thus encrypt N bits with security 2^(cN), via an circuit Q_N containing <= cN two-input logic gates and operating in <= c log(N) gate-delays, where Q_N is constructible in polynomial (in N) time.
You should see the video here…
High quality
Fullscreen
Volume
Download
MP4 (iPod/small), 123.37 MB
MP4 (HD/large), 368.83 MB
Podcast
RSS (iPod/small)
RSS (HD/large)



« Back to seminars
Other video recordings »