Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing (Q6097257): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Preimage Attacks on One-Block MD4, 63-Step MD5 and More / rank
 
Normal rank
Property / cites work
 
Property / cites work: Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automatic search of meet-in-the-middle preimage attacks on AES-like hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automatic Search of Attacks on Round-Reduced AES and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2760977 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Match Box Meet-in-the-Middle Attack Against KATAN / rank
 
Normal rank
Property / cites work
 
Property / cites work: Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tweaks and Keys for Block Ciphers: The TWEAKEY Framework / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rebound Distinguishers: Results on the Full Whirlpool Compression Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: MD4 is Not One-Way / rank
 
Normal rank
Property / cites work
 
Property / cites work: Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved (pseudo) preimage attacks on reduced-round \texttt{GOST} and \texttt{Grøstl-256} and studies on several truncation patterns for \texttt{AES}-like compression functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341762 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool / rank
 
Normal rank
Property / cites work
 
Property / cites work: Preimage Attacks on 3, 4, and 5-Pass HAVAL / rank
 
Normal rank
Property / cites work
 
Property / cites work: Preimage Attacks on Step-Reduced MD5 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding Preimages in Full MD5 Faster Than Exhaustive Search / rank
 
Normal rank
Property / cites work
 
Property / cites work: Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Guess-and-Determine Attack on the Self-Shrinking Generator / rank
 
Normal rank

Latest revision as of 07:53, 1 August 2024

scientific article; zbMATH DE number 7694614
Language Label Description Also known as
English
Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing
scientific article; zbMATH DE number 7694614

    Statements

    Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    12 June 2023
    0 references
    The Meet-in-the-Middle approach is one of the most powerful cryptanalysis techniques, demonstrated by its applications in preimage attacks on the full MD4, MD5, Tiger, HAVAL, and Haraka-512 v2 hash functions, and key recovery of the full block cipher KTANTAN. The success relies on the separation of a primitive into two independent chunks, where each active cell of the state is used to represent only one chunk or is otherwise considered unusable once mixed. The authors observe that some of such cells are linearly mixed and can be as useful as the independent ones. This leads to the introduction of superposition states and a whole suite of accompanying techniques, which they incorporate into the MILPbased search framework proposed by \textit{Z. Bao} et al. [Lect. Notes Comput. Sci. 12696, 771--804 (2021; Zbl 1479.94121)] and \textit{X. Dong} et al. [ibid. 12827, 278--308 (2021; Zbl 1487.94111)], and find applications on a wide range of AES-like hash functions and block ciphers. For the entire collection see [Zbl 1511.94002].
    0 references
    Whirlpool
    0 references
    Grøstl
    0 references
    AES hashing modes
    0 references
    MITM
    0 references
    MILP
    0 references
    0 references
    0 references
    0 references

    Identifiers