Simplified MITM modeling for permutations: new (quantum) attacks
From MaRDI portal
Publication:6163972
DOI10.1007/978-3-031-15982-4_24zbMath1517.94152MaRDI QIDQ6163972
Marc Stevens, André Schrottenloher
Publication date: 30 June 2023
Published in: Advances in Cryptology – CRYPTO 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-15982-4_24
quantum cryptanalysis; preimage attacks; merging algorithms; MITM attacks; permutation-based hashing
05A05: Permutations, words, matrices
94A60: Cryptography
68P25: Data encryption (aspects in computer science)
81P94: Quantum cryptography (quantum-theoretic aspects)
Related Items
Improved attacks against reduced-round Whirlwind, Meet-in-the-middle preimage attacks on sponge-based hashing, Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Putting wings on SPHINCS
- Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- Quantum collision attacks on reduced SHA-256 and SHA-512
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
- Security Analysis of GFN: 8-Round Distinguisher for 4-Branch Type-2 GFN
- Simpira v2: A Family of Efficient Permutations Using the AES Round Function
- Double SP-Functions: Enhanced Generalized Feistel Networks
- A Single-Key Attack on the Full GOST Block Cipher
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses
- All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach
- Known-Key Distinguisher on Full PRESENT
- PRESENT: An Ultra-Lightweight Block Cipher
- Improving the Generalized Feistel
- The Random Oracle Model and the Ideal Cipher Model Are Equivalent
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
- Automatic Search of Attacks on Round-Reduced AES and Applications
- SPONGENT: The Design Space of Lightweight Cryptographic Hashing
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
- One Way Hash Functions and DES