Quantum rebound attacks on reduced-round ARIA-based hash functions

被引:0
|
作者
Baek, Seungjun [1 ]
Kim, Jongsung [1 ,2 ]
机构
[1] Kookmin Univ, Dept Financial Informat Secur, Seoul, South Korea
[2] Kookmin Univ, Dept Informat Secur Cryptol & Math, Seoul, South Korea
关键词
ARIA; block cipher-based hash function; quantum attack; rebound attack; symmetric key cryptography; COLLISION ATTACKS; CONSTRUCTIONS;
D O I
10.4218/etrij.2022-0032
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
ARIA is a block cipher proposed by Kwon et al. at ICISC 2003 that is widely used as the national standard block cipher in the Republic of Korea. Herein, we identify some flaws in the quantum rebound attack on seven-round ARIA-DM proposed by Dou et al. and reveal that the limit of this attack is up to five rounds. Our revised attack applies to not only ARIA-DM but also ARIA-MMO and ARIA-MP among the PGV models, and it is valid for all ARIA key lengths. Furthermore, we present dedicated quantum rebound attacks on seven-round ARIA-Hirose and ARIA-MJH for the first time. These attacks are only valid for the 256-bit key length of ARIA because they are constructed using the degrees of freedom in the key schedule. All our attacks are faster than the generic quantum attack in the cost metric of the time-space tradeoff.
引用
收藏
页码:365 / 378
页数:14
相关论文
共 50 条
  • [31] Practical Attacks on Reduced-Round 3D and Saturnin
    Hou, Tao
    Cui, Ting
    Zhang, Jiyan
    COMPUTER JOURNAL, 2023, 66 (02): : 479 - 495
  • [32] Differential and rectangle attacks on reduced-round SHACAL-1
    Lu, Jiqiang
    Kim, Jongsung
    Keller, Nathan
    Dunkelman, Orr
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 17 - +
  • [33] Preimage attacks on reduced-round <sc>Ascon-Xof</sc>
    Baek, Seungjun
    Kim, Giyoon
    Kim, Jongsung
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (08) : 2197 - 2217
  • [34] Analysis of Two Attacks on Reduced-Round Versions of the SMS4
    Toz, Deniz
    Dunkelman, Orr
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2008, 5308 : 141 - +
  • [35] Higher Order Differential Attacks on Reduced-Round MISTY1
    Tsunoo, Yukiyasu
    Saito, Teruo
    Shigeri, Maki
    Kawabata, Takeshi
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 415 - +
  • [36] Preimage Attacks on Some Hashing Modes Instantiating Reduced-Round LBlock
    Chen, Shiwei
    Jin, Chenhui
    IEEE ACCESS, 2018, 6 : 44659 - 44665
  • [37] Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V
    Hoki, Jin
    Isobe, Takanori
    Ito, Ryoma
    Liu, Fukang
    Sakamoto, Kosei
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 171 - 190
  • [38] Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3
    Abdelkhalek, Ahmed
    AlTawy, Riham
    Tolba, Mohamed
    Youssef, Amr M.
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 : 187 - 203
  • [39] Improved key recovery attacks on reduced-round Salsa20
    Dey, Sabyasachi
    Leander, Gregor
    Sharma, Nitin Kumar
    DESIGNS CODES AND CRYPTOGRAPHY, 2025, 93 (01) : 243 - 262
  • [40] Improved Meet-in-the-Middle Attacks on Round-Reduced ARIA
    Bai, Dongxia
    Yu, Hongbo
    INFORMATION SECURITY (ISC 2013), 2015, 7807 : 155 - 168