Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
نویسندگان
چکیده
The Meet-in-the-Middle (MITM) preimage attack is highly effective in breaking the resistance of many hash functions, including but not limited to full MD5, HAVAL, and Tiger, reduced SHA-0/1/2. It was also shown be a threat functions built on block ciphers like AES by Sasaki 2011. Recently, such attacks hashing modes evolved from merely using freedom choosing internal state exploiting message state. However, detecting especially those variants difficult. In previous works, search space configurations limited, that manual analysis practical, which results sub-optimal solutions. this paper, we remove artificial limitations formulate essential ideas construction well-defined ways, translate problem searching for best into optimization problems under constraints Mixed-Integer-Linear-Programming (MILP) models. MILP models capture large solution valid attacks; objectives are with minimized computational complexity. With off-the-shelf solver, it efficient exhaustively. As result, obtain first against (5-round) an extended (5.5-round) version Haraka-512 v2, 8-round AES-128 modes, as well improved covering more rounds Haraka-256 v2 other members Rijndael modes.
منابع مشابه
Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
We study the security of AES in the open-key setting by showing an analysis on hash function modes instantiating AES including Davies-Meyer, Matyas-Meyer-Oseas, and Miyaguchi-Preneel modes. In particular, we propose preimage attacks on these constructions, while most of previous work focused their attention on collision attacks or distinguishers using non-ideal differential properties. This res...
متن کاملImproved Meet-in-the-Middle Attacks on AES
This paper studies key-recovery attacks on AES-192 and PRINCE under single-key model by methodology of meet-in-the-middle attack. A new technique named key-dependent sieve is proposed to further reduce the memory complexity of Demirci et al.’s attack at EUROCRYPT 2013, which helps us to achieve 9-round attack on AES-192 by using a 5-round distinguisher; the data, time and memory complexities ar...
متن کاملHigher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE
At CRYPTO 2012, Knellwolf and Khovratovich presented a differential formulation of advanced meet-in-the-middle techniques for preimage attacks on hash functions. They demonstrated the usefulness of their approach by significantly improving the previously best known attacks on SHA-1 from CRYPTO 2009, increasing the number of attacked rounds from a 48-round one-block pseudo-preimage without paddi...
متن کاملAutomatic Search of Attacks on Round-Reduced AES and Applications
In this paper, we describe versatile and powerful algorithms for searching guess-and-determine and meet-in-the-middle attacks on byte-oriented symmetric primitives. To demonstrate the strengh of these tool, we show that they allows to automatically discover new attacks on round-reduced AES with very low data complexity, and to find improved attacks on the AES-based MACs Alpha-MAC and Pelican-MA...
متن کاملAutomatic Search of Meet-in-the-Middle and Impossible Differential Attacks
Tracking bits through block ciphers and optimizing attacks at hand is one of the tedious task symmetric cryptanalysts have to deal with. It would be nice if a program will automatically handle them at least for well-known attack techniques, so that cryptanalysts will only focus on nding new attacks. However, current automatic tools cannot be used as is, either because they are tailored for spec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2021
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-030-77870-5_27