Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
From MaRDI portal
Publication:2129000
DOI10.1007/978-3-030-84252-9_10zbMath1487.94111OpenAlexW3191136760MaRDI QIDQ2129000
Siwei Sun, Xiaoyang Dong, Lei Hu, Jialiang Hua, Xiaoyun Wang, Zheng Li
Publication date: 22 April 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84252-9_10
Related Items (10)
Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework ⋮ Improved attacks against reduced-round Whirlwind ⋮ Exploiting non-full key additions: full-fledged automatic Demirci-Selçuk meet-in-the-middle cryptanalysis of SKINNY ⋮ Meet-in-the-middle preimage attacks on sponge-based hashing ⋮ Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing ⋮ Triangulating rebound attack on AES-like hashing ⋮ Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256} ⋮ Differential meet-in-the-middle cryptanalysis ⋮ Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials ⋮ Simplified MITM modeling for permutations: new (quantum) attacks
Uses Software
Cites Work
- Programming the Demirci-Selçuk meet-in-the-middle attack with constraints
- Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT
- A single-key attack on the full GOST block cipher
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- New attacks on IDEA with at least 6 rounds
- Quantum collision attacks on AES-like hashing with low quantum random access memories
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Sieve-in-the-Middle: Improved MITM Attacks
- Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
- Generic Key Recovery Attack on Feistel Scheme
- Three-Subset Meet-in-the-Middle Attack on Reduced XTEA
- Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo
- New Preimage Attacks against Reduced SHA-1
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
- Match Box Meet-in-the-Middle Attack Against KATAN
- Collision Attack on 5 Rounds of Grøstl
- Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster)
- Higher-Order Differential Properties of Keccak and Luffa
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
- Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- (Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Biclique Cryptanalysis of the Full AES
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- New Attacks on Feistel Structures with Improved Memory Complexities
- Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE
- A Meet-in-the-Middle Attack on 8-Round AES
- Finding Preimages of Tiger Up to 23 Steps
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Preimage Attacks on 3, 4, and 5-Pass HAVAL
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- Preimages for Step-Reduced SHA-2
- Improved Rebound Attack on the Finalist Grøstl
- (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
- Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
- Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- Impossible Differential Cryptanalysis of Reduced-Round SKINNY
- Preimage Attacks on Reduced-Round Stribog
- GIFT: A Small Present
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
This page was built for publication: Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks