Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing

نویسندگان

چکیده

The Meet-in-the-Middle (MITM) preimage attack is highly effective in breaking the resistance of many hash functions, including but not limited to full MD5, HAVAL, and Tiger, reduced SHA-0/1/2. It was also shown be a threat functions built on block ciphers like AES by Sasaki 2011. Recently, such attacks hashing modes evolved from merely using freedom choosing internal state exploiting message state. However, detecting especially those variants difficult. In previous works, search space configurations limited, that manual analysis practical, which results sub-optimal solutions. this paper, we remove artificial limitations formulate essential ideas construction well-defined ways, translate problem searching for best into optimization problems under constraints Mixed-Integer-Linear-Programming (MILP) models. MILP models capture large solution valid attacks; objectives are with minimized computational complexity. With off-the-shelf solver, it efficient exhaustively. As result, obtain first against (5-round) an extended (5.5-round) version Haraka-512 v2, 8-round AES-128 modes, as well improved covering more rounds Haraka-256 v2 other members Rijndael modes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool

We study the security of AES in the open-key setting by showing an analysis on hash function modes instantiating AES including Davies-Meyer, Matyas-Meyer-Oseas, and Miyaguchi-Preneel modes. In particular, we propose preimage attacks on these constructions, while most of previous work focused their attention on collision attacks or distinguishers using non-ideal differential properties. This res...

متن کامل

Improved Meet-in-the-Middle Attacks on AES

This paper studies key-recovery attacks on AES-192 and PRINCE under single-key model by methodology of meet-in-the-middle attack. A new technique named key-dependent sieve is proposed to further reduce the memory complexity of Demirci et al.’s attack at EUROCRYPT 2013, which helps us to achieve 9-round attack on AES-192 by using a 5-round distinguisher; the data, time and memory complexities ar...

متن کامل

Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE

At CRYPTO 2012, Knellwolf and Khovratovich presented a differential formulation of advanced meet-in-the-middle techniques for preimage attacks on hash functions. They demonstrated the usefulness of their approach by significantly improving the previously best known attacks on SHA-1 from CRYPTO 2009, increasing the number of attacked rounds from a 48-round one-block pseudo-preimage without paddi...

متن کامل

Automatic Search of Attacks on Round-Reduced AES and Applications

In this paper, we describe versatile and powerful algorithms for searching guess-and-determine and meet-in-the-middle attacks on byte-oriented symmetric primitives. To demonstrate the strengh of these tool, we show that they allows to automatically discover new attacks on round-reduced AES with very low data complexity, and to find improved attacks on the AES-based MACs Alpha-MAC and Pelican-MA...

متن کامل

Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks

Tracking bits through block ciphers and optimizing attacks at hand is one of the tedious task symmetric cryptanalysts have to deal with. It would be nice if a program will automatically handle them at least for well-known attack techniques, so that cryptanalysts will only focus on nding new attacks. However, current automatic tools cannot be used as is, either because they are tailored for spec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2021

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-030-77870-5_27