Welcome to the resource topic for 2021/575
Title:
Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing
Authors: Zhenzhen Bao, Jian Guo, Danping Shi, and Yi Tu
Abstract:The Meet-in-the-Middle approach is one of the most powerful cryptanalysis techniques, demonstrated by its applications in preimage attacks on the full MD4, MD5, Tiger, HAVAL, and Haraka-512 v2 hash functions, and key recovery of the full block cipher KTANTAN. The success relies on the separation of a primitive into two independent chunks, where each active cell of the state is used to represent only one chunk or is otherwise considered unusable once mixed. We observe that some of such cells are linearly mixed and can be as useful as the independent ones. This leads to the introduction of superposition states and a whole suite of accompanied techniques, which we incorporate into the MILP-based search framework proposed by Bao et al. at EUROCRYPT 2021 and Dong et al. at CRYPTO 2021, and find applications on a wide range of AES-like hash functions and block ciphers.
ePrint: https://eprint.iacr.org/2021/575
Talk: https://www.youtube.com/watch?v=iTH0TAN8Xcw
Slides: https://iacr.org/submit/files/slides/2022/crypto/crypto2022/349/slides.pdf
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .