Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
From MaRDI portal
Publication:3013095
DOI10.1007/978-3-642-21702-9_22zbMATH Open1307.94094OpenAlexW41296744MaRDI QIDQ3013095FDOQ3013095
Authors: Yu Sasaki
Publication date: 7 July 2011
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-21702-9_22
Recommendations
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Biclique cryptanalysis of full round AES-128 based hashing modes
- Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks
- Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing
- Practical attacks on AES-like cryptographic hash functions
hash functionmeet-in-the-middleAESpreimageDavies-MeyerPGVWhirlpoolMatyas-Meyer-OseasMiyaguchi-Preneel
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
- Distinguisher and Related-Key Attack on the Full AES-256
- Known-Key Distinguishers for Some Block Ciphers
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- MD4 is Not One-Way
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Preimages for Reduced SHA-0 and SHA-1
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher
- Title not available (Why is that?)
- Improved single-key attacks on 8-round AES-192 and AES-256
- Rebound distinguishers: results on the full Whirlpool compression function
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
- Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- A Meet-in-the-Middle Attack on 8-Round AES
- Preimage Attacks on 3, 4, and 5-Pass HAVAL
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
- Preimages for step-reduced SHA-2
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- New Impossible Differential Attacks on AES
- Blockcipher-Based Hashing Revisited
- Hash Functions and RFID Tags: Mind the Gap
- The rebound attack and subspace distinguishers: application to Whirlpool
- Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others
- The effects of the omission of last round's MixColumns on AES
- Preimages for Reduced-Round Tiger
Cited In (26)
- The rebound attack and subspace distinguishers: application to Whirlpool
- Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}
- Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions
- Cryptanalysis of reduced-round Whirlwind
- Biclique cryptanalysis of full round AES-128 based hashing modes
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others
- A Meet-in-the-Middle Attack on 8-Round AES
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Automated meet-in-the-middle attack goes to Feistel
- Meet-in-the-middle preimage attacks on sponge-based hashing
- Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing
- Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Simplified MITM modeling for permutations: new (quantum) attacks
- Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials
- An improved preimage attack against \texttt{HAVAL-3}
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2
- Key structures: improved related-key boomerang attack against the full AES-256
- Triangulating rebound attack on AES-like hashing
- Diving deep into the preimage security of AES-like hashing
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- Preimage attacks on Feistel-SP functions: impact of omitting the last network twist
- Generic MitM attack frameworks on sponge constructions
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD
Uses Software
This page was built for publication: Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3013095)