Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes

被引:9
|
作者
Bao, Zhenzhen [1 ,2 ]
Ding, Lin [3 ]
Guo, Jian [1 ]
Wang, Haoyang [1 ]
Zhang, Wenying [1 ,4 ]
机构
[1] Nanyang Technol Univ, Sch Phys & Math Sci, Div Math Sci, Singapore, Singapore
[2] Nanyang Technol Univ, Strateg Ctr Res Privacy Preserving Technol & Syst, Singapore, Singapore
[3] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai, Peoples R China
[4] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan, Peoples R China
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
AES; MITM; preimage; hashing mode; key-schedule; FINDING PREIMAGES; MD4; TIGER;
D O I
10.13154/tosc.v2019.i4.318-347
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Hashing modes are ways to convert a block cipher into a hash function, and those with AES as the underlying block cipher are referred to as AES hashing modes. Sasaki in 2011, introduced the first preimage attack against AES hashing modes with the AES block cipher reduced to 7 rounds, by the method of meet-in-the-middle. In his attack, the key-schedules are not taken into account. Hence, the same attack applies to all three versions of AES. In this paper, by introducing neutral bits from the key, extra degree of freedom is gained, which is utilized in two ways, i.e., to reduce the time complexity and to extend the attack to more rounds. As an immediate result, the complexities of 7-round pseudo-preimage attacks are reduced from 2 120 to 2 104, 2 96, and 2 96 for AES-128, AES-192, and AES-256, respectively. By carefully choosing the neutral bits from the key to cancel those from the state, the attack is extended to 8 rounds for AES-192 and AES-256 with complexities 2 112 and 2 96. Similar results are obtained for Kiasu-BC, a tweakable block cipher based on AES-128, and interestingly the additional input tweak helps reduce the complexity and extend the attack to one more round. To the best of our knowledge, these are the first preimage attacks against 8-round AES hashing modes.
引用
收藏
页码:318 / 347
页数:30
相关论文
共 50 条
  • [1] Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
    Sasaki, Yu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 121 - 130
  • [2] Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
    Sasaki, Yu
    FAST SOFTWARE ENCRYPTION (FSE 2011), 2011, 6733 : 378 - 396
  • [3] Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
    Bao, Zhenzhen
    Dong, Xiaoyang
    Guo, Jian
    Li, Zheng
    Shi, Danping
    Sun, Siwei
    Wang, Xiaoyun
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT I, 2021, 12696 : 771 - 804
  • [4] Meet-in-the-Middle Preimage Attacks on Sponge-Based Hashing
    Qin, Lingyue
    Hua, Jialiang
    Dong, Xiaoyang
    Yan, Hailun
    Wang, Xiaoyun
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT IV, 2023, 14007 : 158 - 188
  • [5] Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
    Dong, Xiaoyang
    Guo, Jian
    Li, Shun
    Pham, Phuong
    Zhang, Tianyu
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 158 - 187
  • [6] Improved Meet-in-the-Middle Attacks on AES
    Demirci, Hueseyin
    Taskin, Ihsan
    Coban, Mustafa
    Baysal, Adnan
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 144 - 156
  • [7] Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
    Zhang, Zhiyu
    Sun, Siwei
    Wang, Caibing
    Hu, Lei
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (02) : 224 - 252
  • [8] Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing
    Bao, Zhenzhen
    Guo, Jian
    Shi, Danping
    Tu, Yi
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT I, 2022, 13507 : 64 - 93
  • [9] Meet-in-the-middle attacks on AES with value constraints
    Dong, Xiaoli
    Liu, Jun
    Wei, Yongzhuang
    Gao, Wen
    Chen, Jie
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (09) : 2423 - 2449
  • [10] Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks
    Dong, Xiaoyang
    Hua, Jialiang
    Sun, Siwei
    Li, Zheng
    Wang, Xiaoyun
    Hu, Lei
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 278 - 308