How I broke AES (Advanced Encryption Standard) if I did it

Published: Feb. 2, 2009, midnight

Speaker:\n\nDr. W. D. Smith\n\n\nAbstract:\n\nWe describe a new simple but more powerful form of linear cryptanalysis. It appears to break AES (and undoubtedly other cryptosystems too, e.g. SKIPJACK).\r*But the break is "nonconstructive".\r*Even if this break is broken (due to the underlying models inadequately approximating the real world) we explain how AES still could contain "trapdoors" which would make cryptanalysis unexpectedly easy for anybody who knew the trapdoor.\r\rWe then discuss how to use the theory of BLECCs to build cryptosystems provably\r*not containing trapdoors of this sort,\r*secure against our strengthened form of linear cryptanalysis,\r*secure against "differential" cryptanalysis,\r*secure against D.J. Bernstein's timing attack.\r\rUsing this technique we prove a fundamental theorem: it is possible to thus encrypt N bits with security 2^(cN), via an circuit Q_N containing <= cN two-input logic gates and operating in <= c log(N) gate-delays, where Q_N is constructible in polynomial (in N) time.