Quantum rebound attacks on reduced-round ARIA-based hash functions

被引:0
|
作者
Baek, Seungjun [1 ]
Kim, Jongsung [1 ,2 ]
机构
[1] Kookmin Univ, Dept Financial Informat Secur, Seoul, South Korea
[2] Kookmin Univ, Dept Informat Secur Cryptol & Math, Seoul, South Korea
关键词
ARIA; block cipher-based hash function; quantum attack; rebound attack; symmetric key cryptography; COLLISION ATTACKS; CONSTRUCTIONS;
D O I
10.4218/etrij.2022-0032
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
ARIA is a block cipher proposed by Kwon et al. at ICISC 2003 that is widely used as the national standard block cipher in the Republic of Korea. Herein, we identify some flaws in the quantum rebound attack on seven-round ARIA-DM proposed by Dou et al. and reveal that the limit of this attack is up to five rounds. Our revised attack applies to not only ARIA-DM but also ARIA-MMO and ARIA-MP among the PGV models, and it is valid for all ARIA key lengths. Furthermore, we present dedicated quantum rebound attacks on seven-round ARIA-Hirose and ARIA-MJH for the first time. These attacks are only valid for the 256-bit key length of ARIA because they are constructed using the degrees of freedom in the key schedule. All our attacks are faster than the generic quantum attack in the cost metric of the time-space tradeoff.
引用
收藏
页码:365 / 378
页数:14
相关论文
共 50 条
  • [41] Quantum cryptanalysis of reduced-round E2 algorithm
    Xu, Ying
    Du, Xiaoni
    Jia, Meichun
    Wang, Xiangyu
    Zou, Jian
    QUANTUM INFORMATION PROCESSING, 2025, 24 (02)
  • [42] Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128
    Liu, Ya
    Yang, Anren
    Dai, Bo
    Li, Wei
    Liu, Zhiqiang
    Gu, Dawu
    Zeng, Zhiqiang
    COMPUTER JOURNAL, 2018, 61 (08): : 1252 - 1258
  • [43] Related-Key Attacks on Reduced-Round Hierocrypt-L1
    Taga, Bungo
    Moriai, Shiho
    Aoki, Kazumaro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (01) : 126 - 137
  • [44] Improved key-recovery attacks on reduced-round WEM-8
    Jun Liu
    Dachao Wang
    Yupu Hu
    Jie Chen
    Baocang Wang
    Designs, Codes and Cryptography, 2022, 90 : 2419 - 2448
  • [45] Meet-in-the-Middle Attacks on Reduced-Round QARMA-64/128
    Li, Rongjia
    Jin, Chenhui
    COMPUTER JOURNAL, 2018, 61 (08): : 1158 - 1165
  • [46] Improved key-recovery attacks on reduced-round WEM-8
    Liu, Jun
    Wang, Dachao
    Hu, Yupu
    Chen, Jie
    Wang, Baocang
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (10) : 2419 - 2448
  • [47] Improved meet-in-the-middle attacks on reduced-round Joltik-BC
    Li, Manman
    Chen, Shaozhen
    IET INFORMATION SECURITY, 2021, 15 (03) : 247 - 255
  • [48] Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE
    Su, Bozhan
    Wu, Wenling
    Wu, Shuang
    Dong, Le
    CRYPTOLOGY AND NETWORK SECURITY, 2010, 6467 : 124 - +
  • [49] Integral and impossible-differential attacks on the reduced-round Lesamnta-LW-BC
    Shiba, Rentaro
    Sakamoto, Kosei
    Liu, Fukang
    Minematsu, Kazuhiko
    Isobe, Takanori
    IET INFORMATION SECURITY, 2022, 16 (02) : 75 - 85
  • [50] Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
    Aumasson, Jean-Philippe
    Dinur, Itai
    Meier, Willi
    Shamir, Adi
    FAST SOFTWARE ENCRYPTION, 2009, 5665 : 1 - +