Meet-in-the-Middle Preimage Attacks on Sponge-Based Hashing

被引:11
|
作者
Qin, Lingyue [1 ,2 ,4 ,7 ]
Hua, Jialiang [3 ]
Dong, Xiaoyang [3 ,4 ,7 ]
Yan, Hailun [5 ]
Wang, Xiaoyun [3 ,4 ,6 ,7 ]
机构
[1] Tsinghua Univ, BNRist, Beijing, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Tsinghua Univ, Inst Adv Study, BNRist, Beijing, Peoples R China
[4] Zhongguancun Lab, Beijing, Peoples R China
[5] Univ Chinese Acad Sci, Sch Cryptol, Beijing, Peoples R China
[6] Shandong Univ, Sch Cyber Sci & Technol, Key Lab Cryptol Technol & Informat Secur, Minist Educ, Qingdao, Peoples R China
[7] Natl Financial Cryptog Res Ctr, Beijing, Peoples R China
基金
国家重点研发计划;
关键词
MitM; Automatic Tool; Keccak/SHA3; Ascon; Xoodyak; CRYPTANALYSIS; MD4; SEARCH; KECCAK; AES;
D O I
10.1007/978-3-031-30634-1_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Meet-in-the-Middle (MitM) attack has been widely applied to preimage attacks on Merkle-Damg degrees ard (MD) hashing. In this paper, we introduce a generic framework of the MitM attack on sponge-based hashing. We find certain bit conditions can significantly reduce the diffusion of the unknown bits and lead to longer MitM characteristics. To find good or optimal configurations of MitM attacks, e.g., the bit conditions, the neutral sets, and the matching points, we introduce the bit-level MILP-based automatic tools on Keccak, Ascon and Xoodyak. To reduce the scale of bit-level models and make them solvable in reasonable time, a series of properties of the targeted hashing are considered in the modelling, such as the linear structure and CP-kernel for Keccak, the Boolean expression of Sbox for Ascon. Finally, we give an improved 4-round preimage attack on Keccak-512/SHA3, and break a nearly 10 years' cryptanalysis record. We also give the first preimage attacks on 3-/4-round Ascon-XOF and 3-round Xoodyak-XOF.
引用
收藏
页码:158 / 188
页数:31
相关论文
共 50 条
  • [31] Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik
    Tolba, Mohamed
    Youssef, Amr M.
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017, 2018, 10779 : 26 - 38
  • [32] Meet-in-the-middle attacks on round-reduced CRAFT based on automatic search
    Ma, Zhangjun
    Li, Manman
    Chen, Shaozhen
    IET INFORMATION SECURITY, 2023, 17 (03) : 534 - 543
  • [33] Improved meet-in-the-middle attacks on reduced-round Piccolo
    Ya LIU
    Liang CHENG
    Zhiqiang LIU
    Wei LI
    Qingju WANG
    Dawu GU
    ScienceChina(InformationSciences), 2018, 61 (03) : 95 - 107
  • [34] Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
    Guo, Jian
    Jean, Jeremy
    Nikolic, Ivica
    Sasaki, Yu
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2016, 2016 (02) : 307 - 337
  • [35] Improved meet-in-the-middle attacks on reduced-round Piccolo
    Liu, Ya
    Cheng, Liang
    Liu, Zhiqiang
    Li, Wei
    Wang, Qingju
    Gu, Dawu
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
  • [36] Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
    Guo, Jian
    Ling, San
    Rechberger, Christian
    Wang, Huaxiong
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 56 - +
  • [37] Improved meet-in-the-middle attacks on reduced-round DES
    Dunkelman, Orr
    Sekar, Gautharn
    Preneel, Bart
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 86 - 100
  • [38] Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications
    Sasaki, Yu
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479 : 253 - 270
  • [39] Improved Meet-in-the-Middle Attacks on Round-Reduced ARIA
    Bai, Dongxia
    Yu, Hongbo
    INFORMATION SECURITY (ISC 2013), 2015, 7807 : 155 - 168
  • [40] Improved meet-in-the-middle attacks on reduced-round Piccolo
    Ya Liu
    Liang Cheng
    Zhiqiang Liu
    Wei Li
    Qingju Wang
    Dawu Gu
    Science China Information Sciences, 2018, 61