Simplified Modeling of MITM Attacks for Block Ciphers: New (Quantum) Attacks

被引:4
|
作者
Schrottenloher, Andre [1 ]
Stevens, Marc [2 ]
机构
[1] Univ Rennes, Inst Rech Informat & Syst Aleatoires IRISA, Ctr Natl Rech Sci CNRS, Inria, Rennes, France
[2] Ctr Wiskunde & Informat CWI, Cryptol Grp, Amsterdam, Netherlands
关键词
MITM Attacks; Key-recovery attacks; Quantum cryptanalysis; Preimage attacks; AES; Present; MIDDLE PREIMAGE ATTACKS; CRYPTANALYSIS; SEARCH; MD4; AES;
D O I
10.46586/tosc.v2023.i3.146-183
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The meet-in-the-middle (MITM) technique has led to many key-recovery attacks on block ciphers and preimage attacks on hash functions. Nowadays, cryptographers use automatic tools that reduce the search of MITM attacks to an optimization problem. Bao et al. (EUROCRYPT 2021) introduced a low-level modeling based which was extended to key-recovery attacks by Dong et al. (CRYPTO 2021). However, the modeling only covers AES-like designs. Schrottenloher and Stevens (CRYPTO 2022) proposed a different approach aiming at higher-level simplified models. However, this modeling was limited to cryptographic permutations. In this paper, we extend the latter simplified modeling to also cover block ciphers with simple key schedules. The resulting modeling enables us to target a large array of primitives, typically lightweight SPN ciphers where the key schedule has a slow diffusion, or none at all. We give several applications such as full breaks of the PIPO-256 and FUTURE block ciphers, and reduced-round classical and quantum attacks on SATURNIN-Hash.
引用
收藏
页码:146 / 183
页数:38
相关论文
共 50 条
  • [1] Simplified MITM Modeling for Permutations: New (Quantum) Attacks
    Schrottenloher, Andre
    Stevens, Marc
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT III, 2022, 13509 : 717 - 747
  • [2] A new type of attacks on block ciphers
    Ryabko B.Ya.
    Monarev V.A.
    Shokin Yu.I.
    Problems of Information Transmission, 2005, 41 (4) : 385 - 394
  • [3] New combined attacks on block ciphers
    Biham, E
    Dunkelman, O
    Keller, N
    FAST SOFTWARE ENCRYPTION, 2005, 3557 : 126 - 144
  • [4] Quantum attacks on some feistel block ciphers
    Dong, Xiaoyang
    Dong, Bingyou
    Wang, Xiaoyun
    DESIGNS CODES AND CRYPTOGRAPHY, 2020, 88 (06) : 1179 - 1203
  • [5] Quantum attacks on some feistel block ciphers
    Xiaoyang Dong
    Bingyou Dong
    Xiaoyun Wang
    Designs, Codes and Cryptography, 2020, 88 : 1179 - 1203
  • [6] Algebraic Attacks on Block Ciphers Using Quantum Annealing
    Burek, Elzbieta
    Wronski, Micha
    Mank, Krzysztof
    Misztal, Micha
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2022, 10 (02) : 678 - 689
  • [7] Cache attacks on block ciphers
    Zhao, Xinjie
    Wang, Tao
    Guo, Shize
    Liu, Huiying
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49 (03): : 453 - 468
  • [8] Applicability of XSL attacks to block ciphers
    Xiao, L
    ELECTRONICS LETTERS, 2003, 39 (25) : 1810 - 1811
  • [9] New Birthday Attacks on Some MACS Based on Block Ciphers
    Yuan, Zheng
    Tang, Wei
    Jia, Keting
    Xu, Guangwu
    Wang, Xiaoyun
    ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 209 - +
  • [10] Attacks on block ciphers of low algebraic degree
    Jakobsen, T
    Knudsen, LR
    JOURNAL OF CRYPTOLOGY, 2001, 14 (03) : 197 - 210