Meet-in-the-Middle Preimage Attacks on Sponge-Based Hashing

被引:11
|
作者
Qin, Lingyue [1 ,2 ,4 ,7 ]
Hua, Jialiang [3 ]
Dong, Xiaoyang [3 ,4 ,7 ]
Yan, Hailun [5 ]
Wang, Xiaoyun [3 ,4 ,6 ,7 ]
机构
[1] Tsinghua Univ, BNRist, Beijing, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Tsinghua Univ, Inst Adv Study, BNRist, Beijing, Peoples R China
[4] Zhongguancun Lab, Beijing, Peoples R China
[5] Univ Chinese Acad Sci, Sch Cryptol, Beijing, Peoples R China
[6] Shandong Univ, Sch Cyber Sci & Technol, Key Lab Cryptol Technol & Informat Secur, Minist Educ, Qingdao, Peoples R China
[7] Natl Financial Cryptog Res Ctr, Beijing, Peoples R China
基金
国家重点研发计划;
关键词
MitM; Automatic Tool; Keccak/SHA3; Ascon; Xoodyak; CRYPTANALYSIS; MD4; SEARCH; KECCAK; AES;
D O I
10.1007/978-3-031-30634-1_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Meet-in-the-Middle (MitM) attack has been widely applied to preimage attacks on Merkle-Damg degrees ard (MD) hashing. In this paper, we introduce a generic framework of the MitM attack on sponge-based hashing. We find certain bit conditions can significantly reduce the diffusion of the unknown bits and lead to longer MitM characteristics. To find good or optimal configurations of MitM attacks, e.g., the bit conditions, the neutral sets, and the matching points, we introduce the bit-level MILP-based automatic tools on Keccak, Ascon and Xoodyak. To reduce the scale of bit-level models and make them solvable in reasonable time, a series of properties of the targeted hashing are considered in the modelling, such as the linear structure and CP-kernel for Keccak, the Boolean expression of Sbox for Ascon. Finally, we give an improved 4-round preimage attack on Keccak-512/SHA3, and break a nearly 10 years' cryptanalysis record. We also give the first preimage attacks on 3-/4-round Ascon-XOF and 3-round Xoodyak-XOF.
引用
收藏
页码:158 / 188
页数:31
相关论文
共 50 条
  • [1] Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
    Sasaki, Yu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 121 - 130
  • [2] Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
    Bao, Zhenzhen
    Ding, Lin
    Guo, Jian
    Wang, Haoyang
    Zhang, Wenying
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (04) : 318 - 347
  • [3] Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
    Sasaki, Yu
    FAST SOFTWARE ENCRYPTION (FSE 2011), 2011, 6733 : 378 - 396
  • [4] Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
    Bao, Zhenzhen
    Dong, Xiaoyang
    Guo, Jian
    Li, Zheng
    Shi, Danping
    Sun, Siwei
    Wang, Xiaoyun
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT I, 2021, 12696 : 771 - 804
  • [5] Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks
    Dong, Xiaoyang
    Hua, Jialiang
    Sun, Siwei
    Li, Zheng
    Wang, Xiaoyun
    Hu, Lei
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 278 - 308
  • [6] Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
    Dong, Xiaoyang
    Guo, Jian
    Li, Shun
    Pham, Phuong
    Zhang, Tianyu
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 158 - 187
  • [7] Meet-in-the-Middle Preimage Attacks Revisited New Results on MD5 and HAVAL
    Sasaki, Yu
    Komatsubara, Wataru
    Sakai, Yasuhide
    Wang, Lei
    Iwamoto, Mitsugu
    Sakiyama, Kazuo
    Ohta, Kazuo
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 111 - 122
  • [8] Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
    Zhang, Zhiyu
    Sun, Siwei
    Wang, Caibing
    Hu, Lei
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (02) : 224 - 252
  • [9] Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
    Aoki, Kazumaro
    Sasaki, Yu
    ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 70 - 89
  • [10] Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE
    Espitau, Thomas
    Fouque, Pierre-Alain
    Karpman, Pierre
    ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 : 683 - 701