Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3

被引:2
|
作者
Abdelkhalek, Ahmed [1 ]
AlTawy, Riham [1 ]
Tolba, Mohamed [1 ]
Youssef, Amr M. [1 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn, Montreal, PQ, Canada
来源
关键词
Cryptanalysis; Hierocrypt-3; Meet-in-the-middle attack; Differential enumeration; CRYPTANALYSIS;
D O I
10.1007/978-3-319-22174-8_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hierocrypt-3 is an SPN-based block cipher designed byToshiba Corporation. It operates on 128-bit state using either 128, 192 or 256-bit key. In this paper, we present two meet-in-the-middle attacks in the single-key setting on the 4-round reduced Hierocrypt-3 with 256-bit key. The first attack is based on the differential enumeration approach where we propose a truncated differential characteristic in the first 2.5 rounds and match a multiset of state differences at its output. The other attack is based on the original meet-in-the-middle attack strategy proposed by Demirci and Sel, cuk at FSE 2008 to attack reduced versions of both AES-192 and AES-256. For our attack based on the differential enumeration, the master key is recovered with data complexity of 2(113) chosen plaintexts, time complexity of 2(238) 4-round reduced Hierocrypt-3 encryptions and memory complexity of 2(218) 128-bit blocks. The data, time and memory complexities of our second attack are 2(32), 2(245) and 2(242), respectively. To the best of our knowledge, these are the first attacks on 4-round reduced Hierocrypt-3.
引用
收藏
页码:187 / 203
页数:17
相关论文
共 50 条
  • [41] Improved Meet-in-the-middle Attacks on Reduced-roundMIBS-80 Cipher br
    Ren, Jiongjiong
    Hou, Zezhou
    Li, Manman
    Lin, Dongdong
    Chen, Shaozhen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (08) : 2914 - 2923
  • [42] Practical Attacks on Reduced-Round 3D and Saturnin
    Hou, Tao
    Cui, Ting
    Zhang, Jiyan
    COMPUTER JOURNAL, 2023, 66 (02): : 479 - 495
  • [43] Improved meet-in-the-middle attacks on Crypton and mCrypton
    Li, Rongjia
    Jin, Chenhui
    IET INFORMATION SECURITY, 2017, 11 (02) : 97 - 103
  • [44] Meet-in-the-middle attacks on AES with value constraints
    Dong, Xiaoli
    Liu, Jun
    Wei, Yongzhuang
    Gao, Wen
    Chen, Jie
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (09) : 2423 - 2449
  • [45] Improved Meet-in-the-Middle Attacks on Crypton and mCrypton
    Cui, Jingyi
    Guo, Jiansheng
    Huang, Yanyan
    Liu, Yipeng
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (05): : 2660 - 2679
  • [46] Improved attacks against reduced-round Whirlwind
    Wei, Congming
    Dong, Bingyou
    Hua, Jialiang
    Dong, Xiaoyang
    Zhang, Guoyan
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (11) : 3581 - 3602
  • [47] Improved attacks against reduced-round Whirlwind
    Congming Wei
    Bingyou Dong
    Jialiang Hua
    Xiaoyang Dong
    Guoyan Zhang
    Designs, Codes and Cryptography, 2023, 91 : 3581 - 3602
  • [48] A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique
    Hao, Yonglin
    Bai, Dongxia
    Li, Leibo
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 166 - 183
  • [49] A Meet-in-the-Middle Attack on 8-Round AES
    Demirci, Hueseyin
    Selcuk, Ali Aydin
    FAST SOFTWARE ENCRYPTION, 2008, 5086 : 116 - +
  • [50] Extended meet-in-the-middle attacks on some Feistel constructions
    Guo, Jian
    Jean, Jeremy
    Nikolic, Ivica
    Sasaki, Yu
    DESIGNS CODES AND CRYPTOGRAPHY, 2016, 80 (03) : 587 - 618