Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
From MaRDI portal
Publication:2129000
DOI10.1007/978-3-030-84252-9_10zbMATH Open1487.94111OpenAlexW3191136760MaRDI QIDQ2129000FDOQ2129000
Authors: Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu
Publication date: 22 April 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84252-9_10
Recommendations
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others
- Improving implementable meet-in-the-middle attacks by orders of magnitude
- Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
- Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
- Meet-in-the-middle attacks on generic Feistel constructions
- Meet-in-the-middle preimage attacks on sponge-based hashing
- Meet-in-the-middle attacks on reduced-round Hierocrypt-3
- Extended meet-in-the-middle attacks on some Feistel constructions
Cites Work
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- GIFT: A Small Present
- Higher-order differential properties of Keccak and Luffa
- Biclique Cryptanalysis of the Full AES
- Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
- Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
- Generic Key Recovery Attack on Feistel Scheme
- (Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
- Improved single-key attacks on 8-round AES-192 and AES-256
- Rebound distinguishers: results on the full Whirlpool compression function
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
- Improved meet-in-the-middle cryptanalysis of KTANTAN (poster)
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
- New preimage attacks against reduced SHA-1
- Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- A Meet-in-the-Middle Attack on 8-Round AES
- Preimage Attacks on 3, 4, and 5-Pass HAVAL
- Preimages for step-reduced SHA-2
- Preimage Attacks on Reduced-Round Stribog
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
- Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl
- Improved Rebound Attack on the Finalist Grøstl
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Sieve-in-the-Middle: Improved MITM Attacks
- Three-subset meet-in-the-middle attack on reduced XTEA
- Security analysis of the lightweight block ciphers XTEA, LED and Piccolo
- Programming the Demirci-Selçuk meet-in-the-middle attack with constraints
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT
- (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others
- A single-key attack on the full GOST block cipher
- New Attacks on Feistel Structures with Improved Memory Complexities
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- Quantum collision attacks on AES-like hashing with low quantum random access memories
- Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE
- Finding preimages of Tiger up to 23 steps
- Impossible Differential Cryptanalysis of Reduced-Round SKINNY
- Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks
- New attacks on IDEA with at least 6 rounds
- Match Box Meet-in-the-Middle Attack Against KATAN
- Collision Attack on 5 Rounds of Grøstl
Cited In (20)
- Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}
- Differential meet-in-the-middle cryptanalysis
- Automatic search of linear structure: applications to \textsc{Keccak} and \textsc{Ascon}
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others
- Automated meet-in-the-middle attack goes to Feistel
- Meet-in-the-middle preimage attacks on sponge-based hashing
- Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing
- Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
- Improved attacks against reduced-round Whirlwind
- Simplified MITM modeling for permutations: new (quantum) attacks
- Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
- Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials
- Exploiting non-full key additions: full-fledged automatic Demirci-Selçuk meet-in-the-middle cryptanalysis of SKINNY
- \textit{Caveat implementor!} Key recovery attacks on MEGA
- Triangulating rebound attack on AES-like hashing
- Diving deep into the preimage security of AES-like hashing
- Improved differential meet-in-the-middle cryptanalysis
- Generic MitM attack frameworks on sponge constructions
- Extended meet-in-the-middle attacks on some Feistel constructions
Uses Software
This page was built for publication: Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2129000)