Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions

被引:1
|
作者
Baek, Seungjun [1 ]
Cho, Sehee [1 ]
Kim, Jongsung [2 ]
机构
[1] Kookmin Univ, Dept Financial Informat Secur, Seoul, South Korea
[2] Kookmin Univ, Dept Informat Secur Cryptol & Math, Dept Financial Informat Secur, Seoul, South Korea
关键词
AES-based hash functions; Quantum collision attack; Chosen-key differential trail; Davies-Meyer; Hirose; MJH; COLLISION ATTACKS; PREIMAGE ATTACKS; SECURITY; MODES; CONSTRUCTIONS; SEARCH;
D O I
10.1007/s11128-022-03499-5
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Recently, Hosoyamada and Sasaki (Eurocrypt'20) proposed dedicated quantum collision attacks on AES-MMO and AES-MP and revealed that a differential trail that is not available in the classical setting due to a low probability can be utilized in the quantum settings. Their works encouraged cryptographers to actively perform security analysis of concrete hash functions in the quantum settings, which had not received much attention before. Xiaoyang Dong et al. (Asiacrypt'20) proposed improved dedicated quantum collision attacks on AES-MMO and AES-MP, and Chauhan et al. (ToSC'21) proposed quantum rebound attacks on the double-block-length hash function Hirose instantiated with 10-round reduced AES-256. In this paper, we propose a quantum collision attack on the Davies-Meyer (DM) hash function instantiated with full-round AES-256. We construct a new chosen-key differential trail for AES-256 based on the trail of Biryukov et al. proposed in 2009 and use it to find collisions of the full AES-256-based DM in a quantum setting. We also present quantum free-start collision attacks on the Hirose and MJH hash functions instantiated with full-round AES-256. These attacks are significant in that they are the first algorithms to find full-round (free-start) collisions. In particular, in the case of Hirose-AES-256, our attacks can cover a larger number of constant c than previously proposed attacks and also cover more rounds.
引用
收藏
页数:32
相关论文
共 2 条