Meet-in-the-Middle Preimage Attacks on Sponge-Based Hashing

被引:11
|
作者
Qin, Lingyue [1 ,2 ,4 ,7 ]
Hua, Jialiang [3 ]
Dong, Xiaoyang [3 ,4 ,7 ]
Yan, Hailun [5 ]
Wang, Xiaoyun [3 ,4 ,6 ,7 ]
机构
[1] Tsinghua Univ, BNRist, Beijing, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Tsinghua Univ, Inst Adv Study, BNRist, Beijing, Peoples R China
[4] Zhongguancun Lab, Beijing, Peoples R China
[5] Univ Chinese Acad Sci, Sch Cryptol, Beijing, Peoples R China
[6] Shandong Univ, Sch Cyber Sci & Technol, Key Lab Cryptol Technol & Informat Secur, Minist Educ, Qingdao, Peoples R China
[7] Natl Financial Cryptog Res Ctr, Beijing, Peoples R China
基金
国家重点研发计划;
关键词
MitM; Automatic Tool; Keccak/SHA3; Ascon; Xoodyak; CRYPTANALYSIS; MD4; SEARCH; KECCAK; AES;
D O I
10.1007/978-3-031-30634-1_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Meet-in-the-Middle (MitM) attack has been widely applied to preimage attacks on Merkle-Damg degrees ard (MD) hashing. In this paper, we introduce a generic framework of the MitM attack on sponge-based hashing. We find certain bit conditions can significantly reduce the diffusion of the unknown bits and lead to longer MitM characteristics. To find good or optimal configurations of MitM attacks, e.g., the bit conditions, the neutral sets, and the matching points, we introduce the bit-level MILP-based automatic tools on Keccak, Ascon and Xoodyak. To reduce the scale of bit-level models and make them solvable in reasonable time, a series of properties of the targeted hashing are considered in the modelling, such as the linear structure and CP-kernel for Keccak, the Boolean expression of Sbox for Ascon. Finally, we give an improved 4-round preimage attack on Keccak-512/SHA3, and break a nearly 10 years' cryptanalysis record. We also give the first preimage attacks on 3-/4-round Ascon-XOF and 3-round Xoodyak-XOF.
引用
收藏
页码:158 / 188
页数:31
相关论文
共 50 条
  • [41] Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
    Li, Ji
    Isobe, Takanori
    Shibutani, Kyoji
    FAST SOFTWARE ENCRYPTION (FSE 2012), 2012, 7549 : 264 - 286
  • [42] Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
    Patrick Derbez
    Léo Perrin
    Journal of Cryptology, 2020, 33 : 1184 - 1215
  • [43] Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
    Derbez, Patrick
    Perrin, Leo
    FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 190 - 216
  • [44] Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
    Nobuyuki, Sugio
    IET INFORMATION SECURITY, 2023, 2023 (01)
  • [45] Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3
    Abdelkhalek, Ahmed
    AlTawy, Riham
    Tolba, Mohamed
    Youssef, Amr M.
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 : 187 - 203
  • [46] Meet-in-the-middle attacks on 10-round AES-256
    Li, Rongjia
    Jin, Chenhui
    DESIGNS CODES AND CRYPTOGRAPHY, 2016, 80 (03) : 459 - 471
  • [47] Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
    Derbez, Patrick
    Perrin, Leo
    JOURNAL OF CRYPTOLOGY, 2020, 33 (03) : 1184 - 1215
  • [48] Meet-in-the-middle attacks on 10-round AES-256
    Rongjia Li
    Chenhui Jin
    Designs, Codes and Cryptography, 2016, 80 : 459 - 471
  • [49] Differential Meet-In-The-Middle Cryptanalysis
    Boura, Christina
    David, Nicolas
    Derbez, Patrick
    Leander, Gregor
    Naya-Plasencia, Maria
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT III, 2023, 14083 : 240 - 272
  • [50] Meet-in-the-middle Cryptanalysis of IVLBC
    Uchiyama, Yuki
    Igarashi, Yasutaka
    2024 IEEE TENTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS, ICCE 2024, 2024, : 445 - 450