Quantum rebound attacks on reduced-round ARIA-based hash functions

被引:0
|
作者
Baek, Seungjun [1 ]
Kim, Jongsung [1 ,2 ]
机构
[1] Kookmin Univ, Dept Financial Informat Secur, Seoul, South Korea
[2] Kookmin Univ, Dept Informat Secur Cryptol & Math, Seoul, South Korea
关键词
ARIA; block cipher-based hash function; quantum attack; rebound attack; symmetric key cryptography; COLLISION ATTACKS; CONSTRUCTIONS;
D O I
10.4218/etrij.2022-0032
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
ARIA is a block cipher proposed by Kwon et al. at ICISC 2003 that is widely used as the national standard block cipher in the Republic of Korea. Herein, we identify some flaws in the quantum rebound attack on seven-round ARIA-DM proposed by Dou et al. and reveal that the limit of this attack is up to five rounds. Our revised attack applies to not only ARIA-DM but also ARIA-MMO and ARIA-MP among the PGV models, and it is valid for all ARIA key lengths. Furthermore, we present dedicated quantum rebound attacks on seven-round ARIA-Hirose and ARIA-MJH for the first time. These attacks are only valid for the 256-bit key length of ARIA because they are constructed using the degrees of freedom in the key schedule. All our attacks are faster than the generic quantum attack in the cost metric of the time-space tradeoff.
引用
收藏
页码:365 / 378
页数:14
相关论文
共 50 条
  • [1] Integral Attacks on Reduced-Round ARIA Block Cipher
    Li, Yanjun
    Wu, Wenling
    Zhang, Lei
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 19 - 29
  • [2] Preimage attacks on reduced-round Keccak hash functions by solving algebraic systems
    Pei, Junling
    Chen, Lusheng
    IET INFORMATION SECURITY, 2023, 17 (03) : 394 - 406
  • [3] Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3512
    Bouillaguet, Charles
    Dunkelman, Orr
    Leurent, Gaean
    Fouquel, Pierre-Alain
    SELECTED AREAS IN CRYPTOGRAPHY, 2011, 6544 : 18 - 35
  • [4] Improved Collision Attacks on the Reduced-Round Grostl Hash Function
    Ideguchi, Kota
    Tischhauser, Elmar
    Preneel, Bart
    INFORMATION SECURITY, 2011, 6531 : 1 - 16
  • [5] Impossible differential cryptanalysis of reduced-round ARIA and Camellia
    Wu, Wen-Ling
    Zhang, Wen-Tao
    Feng, Deng-Guo
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (03) : 449 - 456
  • [6] Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia
    Wen-Ling Wu
    Wen-Tao Zhang
    Deng-Guo Feng
    Journal of Computer Science and Technology, 2007, 22 : 449 - 456
  • [7] A meet-in-the-middle attack on reduced-round ARIA
    Tang, Xuehai
    Sun, Bing
    Li, Ruilin
    Li, Chao
    Yin, Juhua
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (10) : 1685 - 1692
  • [8] Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia
    吴文玲
    张文涛
    冯登国
    Journal of Computer Science & Technology, 2007, (03) : 449 - 456
  • [9] Rebound Attack on Reduced-Round Versions of JH
    Rijmen, Vincent
    Toz, Deniz
    Varici, Kerem
    FAST SOFTWARE ENCRYPTION, 2010, 6147 : 286 - 303
  • [10] Preimage Attacks on Reduced-Round Stribog
    AlTawy, Riham
    Youssef, Amr M.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 109 - 125