Simplified Modeling of MITM Attacks for Block Ciphers: New (Quantum) Attacks

被引:4
|
作者
Schrottenloher, Andre [1 ]
Stevens, Marc [2 ]
机构
[1] Univ Rennes, Inst Rech Informat & Syst Aleatoires IRISA, Ctr Natl Rech Sci CNRS, Inria, Rennes, France
[2] Ctr Wiskunde & Informat CWI, Cryptol Grp, Amsterdam, Netherlands
关键词
MITM Attacks; Key-recovery attacks; Quantum cryptanalysis; Preimage attacks; AES; Present; MIDDLE PREIMAGE ATTACKS; CRYPTANALYSIS; SEARCH; MD4; AES;
D O I
10.46586/tosc.v2023.i3.146-183
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The meet-in-the-middle (MITM) technique has led to many key-recovery attacks on block ciphers and preimage attacks on hash functions. Nowadays, cryptographers use automatic tools that reduce the search of MITM attacks to an optimization problem. Bao et al. (EUROCRYPT 2021) introduced a low-level modeling based which was extended to key-recovery attacks by Dong et al. (CRYPTO 2021). However, the modeling only covers AES-like designs. Schrottenloher and Stevens (CRYPTO 2022) proposed a different approach aiming at higher-level simplified models. However, this modeling was limited to cryptographic permutations. In this paper, we extend the latter simplified modeling to also cover block ciphers with simple key schedules. The resulting modeling enables us to target a large array of primitives, typically lightweight SPN ciphers where the key schedule has a slow diffusion, or none at all. We give several applications such as full breaks of the PIPO-256 and FUTURE block ciphers, and reduced-round classical and quantum attacks on SATURNIN-Hash.
引用
收藏
页码:146 / 183
页数:38
相关论文
共 50 条
  • [31] Fault Template Attacks on Block Ciphers Exploiting Fault Propagation
    Saha, Sayandeep
    Bag, Arnab
    Roy, Debapriya Basu
    Patranabis, Sikhar
    Mukhopadhyay, Debdeep
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 612 - 643
  • [32] Designing against a class of algebraic attacks on symmetric block ciphers
    Adams, C
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2006, 17 (01) : 17 - 27
  • [33] Self-similarity attacks on block ciphers and application to KeeLoq
    Courtois, Nicolas T.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, 6805 LNCS : 55 - 66
  • [34] Designing against a class of algebraic attacks on symmetric block ciphers
    Carlisle Adams
    Applicable Algebra in Engineering, Communication and Computing, 2006, 17 : 17 - 27
  • [35] Quantum key recovery attacks on tweakable Even–Mansour ciphers
    Ping Zhang
    Yiyuan Luo
    Quantum Information Processing, 22
  • [36] Linear attacks on stream ciphers
    Hell M.
    Johansson T.
    Cryptology and Information Security Series, 2011, 7 : 55 - 85
  • [37] Correlation attacks on stream ciphers
    Penzhorn, WT
    AFRICON '96 - 1996 IEEE AFRICON : 4TH AFRICON CONFERENCE IN AFRICA, VOLS I & II: ELECTRICAL ENERGY TECHNOLOGY; COMMUNICATION SYSTEMS; HUMAN RESOURCES, 1996, : 1093 - 1098
  • [38] Cecoin: A decentralized PKI mitigating MitM attacks
    Qin, Bo
    Huang, Jikun
    Wang, Qin
    Luo, Xizhao
    Liang, Bin
    Shi, Wenchang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 : 805 - 815
  • [39] Generalized impossible differential attacks on block ciphers: application to SKINNY and ForkSKINNY
    Song, Ling
    Fu, Qinggan
    Yang, Qianqian
    Lv, Yin
    Hu, Lei
    DESIGNS CODES AND CRYPTOGRAPHY, 2025,
  • [40] On Practical Second-Order Power Analysis Attacks for Block Ciphers
    Menicocci, Renato
    Simonetti, Andrea
    Scotti, Giuseppe
    Trifiletti, Alessandro
    INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 155 - +