This project provides C-based implementations of cryptanalytic attacks on the Advanced Encryption Standard (AES), focusing on two methods: the Yoyo attack and the Boomerang attack. These techniques exploit weaknesses in reduced-round AES to recover secret keys and distinguish AES from random permutations.
-
Updated
Nov 20, 2024 - C