Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3

被引:2
|
作者
Abdelkhalek, Ahmed [1 ]
AlTawy, Riham [1 ]
Tolba, Mohamed [1 ]
Youssef, Amr M. [1 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn, Montreal, PQ, Canada
来源
关键词
Cryptanalysis; Hierocrypt-3; Meet-in-the-middle attack; Differential enumeration; CRYPTANALYSIS;
D O I
10.1007/978-3-319-22174-8_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hierocrypt-3 is an SPN-based block cipher designed byToshiba Corporation. It operates on 128-bit state using either 128, 192 or 256-bit key. In this paper, we present two meet-in-the-middle attacks in the single-key setting on the 4-round reduced Hierocrypt-3 with 256-bit key. The first attack is based on the differential enumeration approach where we propose a truncated differential characteristic in the first 2.5 rounds and match a multiset of state differences at its output. The other attack is based on the original meet-in-the-middle attack strategy proposed by Demirci and Sel, cuk at FSE 2008 to attack reduced versions of both AES-192 and AES-256. For our attack based on the differential enumeration, the master key is recovered with data complexity of 2(113) chosen plaintexts, time complexity of 2(238) 4-round reduced Hierocrypt-3 encryptions and memory complexity of 2(218) 128-bit blocks. The data, time and memory complexities of our second attack are 2(32), 2(245) and 2(242), respectively. To the best of our knowledge, these are the first attacks on 4-round reduced Hierocrypt-3.
引用
收藏
页码:187 / 203
页数:17
相关论文
共 50 条
  • [1] Meet-in-the-Middle Attacks on Reduced-Round XTEA
    Sekar, Gautham
    Mouha, Nicky
    Velichkov, Vesselin
    Preneel, Bart
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 250 - +
  • [2] Improved meet-in-the-middle attacks on reduced-round Piccolo
    Ya LIU
    Liang CHENG
    Zhiqiang LIU
    Wei LI
    Qingju WANG
    Dawu GU
    ScienceChina(InformationSciences), 2018, 61 (03) : 95 - 107
  • [3] Improved meet-in-the-middle attacks on reduced-round Piccolo
    Liu, Ya
    Cheng, Liang
    Liu, Zhiqiang
    Li, Wei
    Wang, Qingju
    Gu, Dawu
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
  • [4] Improved meet-in-the-middle attacks on reduced-round DES
    Dunkelman, Orr
    Sekar, Gautharn
    Preneel, Bart
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 86 - 100
  • [5] Improved meet-in-the-middle attacks on reduced-round Piccolo
    Ya Liu
    Liang Cheng
    Zhiqiang Liu
    Wei Li
    Qingju Wang
    Dawu Gu
    Science China Information Sciences, 2018, 61
  • [6] Improved meet-in-the-middle attacks on reduced-round Joltik-BC
    Li, Manman
    Chen, Shaozhen
    IET INFORMATION SECURITY, 2021, 15 (03) : 247 - 255
  • [7] Meet-in-the-Middle Attacks on Reduced-Round QARMA-64/128
    Li, Rongjia
    Jin, Chenhui
    COMPUTER JOURNAL, 2018, 61 (08): : 1158 - 1165
  • [8] A meet-in-the-middle attack on reduced-round ARIA
    Tang, Xuehai
    Sun, Bing
    Li, Ruilin
    Li, Chao
    Yin, Juhua
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (10) : 1685 - 1692
  • [9] Quantum Demiric-Selcuk Meet-in-the-Middle Attacks on Reduced-Round AES
    Ping Wang
    Xiaomei Chen
    Guohao Jiang
    International Journal of Theoretical Physics, 2022, 61
  • [10] Quantum Demiric-Selcuk Meet-in-the-Middle Attacks on Reduced-Round AES
    Wang, Ping
    Chen, Xiaomei
    Jiang, Guohao
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2022, 61 (01)