A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256

被引:4
作者
Chien, Jiageng [1 ]
Hirose, Shoichi [2 ]
Kuwakado, Hidenori [3 ]
Miyaji, Atsuko [4 ,5 ,6 ]
机构
[1] Cent China Normal Univ, Comp Sch, Wuhan 430079, Peoples R China
[2] Univ Fukui, Grad Sch Engn, Fukui 9108507, Japan
[3] Kansai Univ, Fac Informat, Takatsuki, Osaka 5691095, Japan
[4] Osaka Univ, Grad Sch Engn, 2-2 Yamadaoka, Suita, Osaka 5650871, Japan
[5] Japan Adv Inst Sci & Technol, Sch Informat Sci, Nomi 9231292, Japan
[6] JST, CREST, Kawaguchi, Saitama 3320012, Japan
关键词
double-block-length compression function; free-start collision attack; rebound attack; AES-256; REBOUND ATTACK; HASH FUNCTIONS; SECURITY; CRYPTANALYSIS; DM;
D O I
10.1587/transfun.E99.A.14
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the first non-trivial collision attack on the double-block-length compression function presented at FSE 2006 instantiated with round-reduced AES-256: f(0)(h(0)parallel to h(1), M)parallel to f(1)(h(0)parallel to h(1), M) such that f(0)(h0 parallel to h(1), M) = Eh(1)parallel to(M)(h(0))circle plus h(0), f(1)(h(0)parallel to h(1), M) = E-h1 parallel to(M)(h(0)circle plus c)circle plus h(0)circle plus c, where parallel to represents concatenation, E is AES-256 and c is a 16-byte nonzero constant. The proposed attack is a free-start collision attack using the rebound attack proposed by Mendel et al. The success of the proposed attack largely depends on the configuration of the constant c: the number of its non-zero bytes and their positions. For the instantiation with AES-256 reduced from 14 rounds to 8 rounds, it is effective if the constant c has at most four non-zero bytes at some specific positions, and the time complexity is 2(64) or 2(96). For the instantiation with AES-256 reduced to 9 rounds, it is effective if the constant c has four non-zero bytes at some specific positions, and the time complexity is 2(120). The space complexity is negligible in both cases.
引用
收藏
页码:14 / 21
页数:8
相关论文
共 38 条
[1]   Malicious Hashing: Eve's Variant of SHA-1 [J].
Albertini, Ange ;
Aumasson, Jean-Philippe ;
Eichlseder, Maria ;
Mendel, Florian ;
Schlaeffer, Martin .
SELECTED AREAS IN CRYPTOGRAPHY - SAC 2014, 2014, 8781 :1-19
[2]  
AlTawy Riham, 2014, 2014879 CRYPT EPRINT
[3]  
[Anonymous], 2002, DESIGN RIJNDAEL
[4]  
[Anonymous], 2012, 1804 FIPS PUB
[5]  
Armknecht F, 2011, LECT NOTES COMPUT SC, V7073, P233, DOI 10.1007/978-3-642-25385-0_13
[6]  
Bertoni G., 2008, KECCAK SPONGE FUNCTI
[7]  
Biryukov A, 2009, LECT NOTES COMPUT SC, V5677, P231, DOI 10.1007/978-3-642-03356-8_14
[8]   An Analysis of the Blockcipher-Based Hash Functions from PGV [J].
Black, J. ;
Rogaway, P. ;
Shrimpton, T. ;
Stam, M. .
JOURNAL OF CRYPTOLOGY, 2010, 23 (04) :519-545
[9]  
Bogdanov A, 2008, LECT NOTES COMPUT SC, V5154, P283
[10]  
BRACHTL BO, 1990, Patent No. 4908861