• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Dong, Xiaoyang (Dong, Xiaoyang.) | Hua, Jialiang (Hua, Jialiang.) | Sun, Siwei (Sun, Siwei.) | Li, Zheng (Li, Zheng.) | Wang, Xiaoyun (Wang, Xiaoyun.) | Hu, Lei (Hu, Lei.)

Indexed by:

CPCI-S EI Scopus

Abstract:

At EUROCRYPT 2021, Bao et al. proposed an automatic method for systematically exploring the configuration space of meet-in-the-middle (MITM) preimage attacks. We further extend it into a constraint-based framework for finding exploitable MITM characteristics in the context of key-recovery and collision attacks by taking the subtle peculiarities of both scenarios into account. Moreover, to perform attacks based on MITM characteristics with nonlinear constrained neutral words, which have not been seen before, we present a procedure for deriving the solution spaces of neutral words without solving the corresponding nonlinear equations or increasing the overall time complexities of the attack. We apply our method to concrete symmetric-key primitives, including SKINNY, ForkSkinny, Romulus-H, Saturnin, Grostl, WHIRLPOOL, and hashing modes with AES-256. As a result, we identify the first 23-round key-recovery attack on SKINNY-n-3n and the first 24-round key-recovery attack on ForkSkinny-n-3n in the single-key model. Moreover, improved (pseudo) preimage or collision attacks on round-reduced WHIRLPOOL, Grostl, and hashing modes with AES-256 are obtained. In particular, employing the new representation of the AES key schedule due to Leurent and Pernot (EUROCRYPT 2021), we identify the first preimage attack on 10-round AES-256 hashing.

Keyword:

Collision attack Three-subset MITM AES-256 MILP Preimage attack Meet-in-the-Middle

Author Community:

  • [ 1 ] [Dong, Xiaoyang]Tsinghua Univ, Inst Adv Study, BNRist, Beijing, Peoples R China
  • [ 2 ] [Hua, Jialiang]Tsinghua Univ, Inst Adv Study, BNRist, Beijing, Peoples R China
  • [ 3 ] [Wang, Xiaoyun]Tsinghua Univ, Inst Adv Study, BNRist, Beijing, Peoples R China
  • [ 4 ] [Sun, Siwei]Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
  • [ 5 ] [Hu, Lei]Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
  • [ 6 ] [Sun, Siwei]Univ Chinese Acad Sci, Beijing, Peoples R China
  • [ 7 ] [Hu, Lei]Univ Chinese Acad Sci, Beijing, Peoples R China
  • [ 8 ] [Li, Zheng]Beijing Univ Technol, Fac Informat Technol, Beijing, Peoples R China
  • [ 9 ] [Wang, Xiaoyun]Shandong Univ, Minist Educ, Key Lab Cryptol Technol & Informat Secur, Jinan, Peoples R China
  • [ 10 ] [Wang, Xiaoyun]Shandong Univ, Sch Cyber Sci & Technol, Qingdao, Peoples R China
  • [ 11 ] [Li, Zheng]Beijing Univ Technol, Beijing Key Lab Trusted Comp, Beijing, Peoples R China

Reprint Author's Address:

  • [Hua, Jialiang]Tsinghua Univ, Inst Adv Study, BNRist, Beijing, Peoples R China;;[Sun, Siwei]Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China;;[Sun, Siwei]Univ Chinese Acad Sci, Beijing, Peoples R China

Show more details

Related Keywords:

Related Article:

Source :

ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III

ISSN: 0302-9743

Year: 2021

Volume: 12827

Page: 278-308

Language: English

Cited Count:

WoS CC Cited Count: 32

SCOPUS Cited Count: 32

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 5

Affiliated Colleges:

Online/Total:718/5585727
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.