Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
From MaRDI portal
Publication:3013095
DOI10.1007/978-3-642-21702-9_22zbMath1307.94094OpenAlexW41296744MaRDI QIDQ3013095
Publication date: 7 July 2011
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-21702-9_22
hash functionmeet-in-the-middleAESpreimageDavies-MeyerPGVWhirlpoolMatyas-Meyer-OseasMiyaguchi-Preneel
Related Items
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks ⋮ Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD ⋮ Cryptanalysis of Reduced-Round Whirlwind ⋮ Meet-in-the-middle preimage attacks on sponge-based hashing ⋮ Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing ⋮ Triangulating rebound attack on AES-like hashing ⋮ Key structures: improved related-key boomerang attack against the full AES-256 ⋮ Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256} ⋮ Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials ⋮ Simplified MITM modeling for permutations: new (quantum) attacks ⋮ An improved preimage attack against \texttt{HAVAL-3} ⋮ Automatic search of meet-in-the-middle preimage attacks on AES-like hashing ⋮ Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2 ⋮ The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS ⋮ The rebound attack and subspace distinguishers: application to Whirlpool ⋮ Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions ⋮ Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- The effects of the omission of last round's MixColumns on AES
- The rebound attack and subspace distinguishers: application to Whirlpool
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
- Distinguisher and Related-Key Attack on the Full AES-256
- Blockcipher-Based Hashing Revisited
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- A Meet-in-the-Middle Attack on 8-Round AES
- MD4 is Not One-Way
- Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
- Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Preimages for Reduced SHA-0 and SHA-1
- Preimage Attacks on 3, 4, and 5-Pass HAVAL
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Rebound Distinguishers: Results on the Full Whirlpool Compression Function
- Preimages for Step-Reduced SHA-2
- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
- Known-Key Distinguishers for Some Block Ciphers
- Hash Functions and RFID Tags: Mind the Gap
- Preimages for Reduced-Round Tiger
- New Impossible Differential Attacks on AES