摘要

This paper presents two new methods for related-key Square attack on 7-round and 8-round AES-192, Advanced encryption standard with a 192-bit secret key, by exploiting appropriate related-key differences of AES-192 and weaknesses in their key schedule. This attack on the reduced to 7-round AES-192 just requires about 2(40) chosen plaintexts, demands 2(40) memory, performs 2(96) 7-round AES-192 encryptions. Furthermore, this attack on the reduced to 8-round AES-192 requires about 2(45) chosen plaintexts, demands 2(40) memory, performs 2(167) 8-round AES-192 encryptions.