Meet-in-the-Middle Preimage Attacks on Sponge-Based Hashing

被引:11
|
作者
Qin, Lingyue [1 ,2 ,4 ,7 ]
Hua, Jialiang [3 ]
Dong, Xiaoyang [3 ,4 ,7 ]
Yan, Hailun [5 ]
Wang, Xiaoyun [3 ,4 ,6 ,7 ]
机构
[1] Tsinghua Univ, BNRist, Beijing, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Tsinghua Univ, Inst Adv Study, BNRist, Beijing, Peoples R China
[4] Zhongguancun Lab, Beijing, Peoples R China
[5] Univ Chinese Acad Sci, Sch Cryptol, Beijing, Peoples R China
[6] Shandong Univ, Sch Cyber Sci & Technol, Key Lab Cryptol Technol & Informat Secur, Minist Educ, Qingdao, Peoples R China
[7] Natl Financial Cryptog Res Ctr, Beijing, Peoples R China
基金
国家重点研发计划;
关键词
MitM; Automatic Tool; Keccak/SHA3; Ascon; Xoodyak; CRYPTANALYSIS; MD4; SEARCH; KECCAK; AES;
D O I
10.1007/978-3-031-30634-1_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Meet-in-the-Middle (MitM) attack has been widely applied to preimage attacks on Merkle-Damg degrees ard (MD) hashing. In this paper, we introduce a generic framework of the MitM attack on sponge-based hashing. We find certain bit conditions can significantly reduce the diffusion of the unknown bits and lead to longer MitM characteristics. To find good or optimal configurations of MitM attacks, e.g., the bit conditions, the neutral sets, and the matching points, we introduce the bit-level MILP-based automatic tools on Keccak, Ascon and Xoodyak. To reduce the scale of bit-level models and make them solvable in reasonable time, a series of properties of the targeted hashing are considered in the modelling, such as the linear structure and CP-kernel for Keccak, the Boolean expression of Sbox for Ascon. Finally, we give an improved 4-round preimage attack on Keccak-512/SHA3, and break a nearly 10 years' cryptanalysis record. We also give the first preimage attacks on 3-/4-round Ascon-XOF and 3-round Xoodyak-XOF.
引用
收藏
页码:158 / 188
页数:31
相关论文
共 50 条
  • [21] Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128
    Wang, Lei
    Sasaki, Yu
    Komatsubara, Wataru
    Sakiyama, Kazuo
    Ohta, Kazuo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 100 - 110
  • [22] Meet-in-the-Middle Attacks on SHA-3 Candidates
    Khovratovich, Dmitry
    Nikolic, Ivica
    Weinmann, Ralf-Philipp
    FAST SOFTWARE ENCRYPTION, 2009, 5665 : 228 - 245
  • [23] Meet-in-the-Middle Attacks on Round-Reduced Khudra
    Tolba, Mohamed
    Abdelkhalek, Ahmed
    Youssef, Amr M.
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 127 - 138
  • [24] Extended meet-in-the-middle attacks on some Feistel constructions
    Guo, Jian
    Jean, Jeremy
    Nikolic, Ivica
    Sasaki, Yu
    DESIGNS CODES AND CRYPTOGRAPHY, 2016, 80 (03) : 587 - 618
  • [25] Extended meet-in-the-middle attacks on some Feistel constructions
    Jian Guo
    Jérémy Jean
    Ivica Nikolić
    Yu Sasaki
    Designs, Codes and Cryptography, 2016, 80 : 587 - 618
  • [26] A New Method for Meet-in-the-Middle Attacks on Reduced AES
    Dong Xiaoli
    Hu Yupu
    Wei Yongzhuang
    Chen Jie
    CHINA COMMUNICATIONS, 2011, 8 (02) : 21 - 25
  • [27] New Meet-in-the-Middle Attacks on FOX Block Cipher
    Dong, Xiaoli
    Wei, Yongzhuang
    Gao, Wen
    Chen, Jie
    COMPUTER JOURNAL, 2023, 66 (05): : 1195 - 1212
  • [28] Improved Meet-in-the-Middle Attacks on Generic Feistel Constructions
    Zhao, Shibin
    Duan, Xiaohan
    Deng, Yuanhao
    Peng, Zhiniang
    Zhu, Junhu
    IEEE ACCESS, 2019, 7 : 34416 - 34424
  • [29] Meet-in-the-Middle Attacks on Reduced-Round XTEA
    Sekar, Gautham
    Mouha, Nicky
    Velichkov, Vesselin
    Preneel, Bart
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 250 - +
  • [30] Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
    Derbez, Patrick
    Fouque, Pierre-Alain
    ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 157 - 184