메뉴 건너뛰기




Volumn 6733 LNCS, Issue , 2011, Pages 378-396

Meet-in-the-middle preimage attacks on AES hashing modes and an application to whirlpool

Author keywords

AES; Davies Meyer; hash function; Matyas Meyer Oseas; meet in the middle; Miyaguchi Preneel; PGV; preimage; Whirlpool

Indexed keywords

AES; DAVIES-MEYER; MATYAS-MEYER-OSEAS; MEET-IN-THE-MIDDLE; MIYAGUCHI-PRENEEL; PGV; PREIMAGES; WHIRLPOOL; PRE IMAGES;

EID: 79959972948     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-21702-9_22     Document Type: Conference Paper
Times cited : (58)

References (36)
  • 1
    • 72449208565 scopus 로고    scopus 로고
    • Preimages for Step-Reduced SHA-2
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Aoki, K., Guo, J., Matusiewicz, K., Sasaki, Y., Wang, L.: Preimages for Step-Reduced SHA-2. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 578-597. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 578-597
    • Aoki, K.1    Guo, J.2    Matusiewicz, K.3    Sasaki, Y.4    Wang, L.5
  • 2
    • 70350302881 scopus 로고    scopus 로고
    • Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Aoki, K., Sasaki, Y.: Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 70-89. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 70-89
    • Aoki, K.1    Sasaki, Y.2
  • 3
    • 70350630742 scopus 로고    scopus 로고
    • Preimage attacks on one-block MD4, 63-step MD5 and more
    • Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. Springer, Heidelberg
    • Aoki, K., Sasaki, Y.: Preimage attacks on one-block MD4, 63-step MD5 and more. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 103-119. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5381 , pp. 103-119
    • Aoki, K.1    Sasaki, Y.2
  • 4
    • 70350634268 scopus 로고    scopus 로고
    • Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
    • Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. Springer, Heidelberg
    • Aumasson, J.-P., Meier, W., Mendel, F.: Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 120-135. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5381 , pp. 120-135
    • Aumasson, J.-P.1    Meier, W.2    Mendel, F.3
  • 5
    • 77954648187 scopus 로고    scopus 로고
    • Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Biryukov, A., Dunkelman, O., Keller, N., Khovratovich, D., Shamir, A.: Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 299-319. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 299-319
    • Biryukov, A.1    Dunkelman, O.2    Keller, N.3    Khovratovich, D.4    Shamir, A.5
  • 6
    • 72449149100 scopus 로고    scopus 로고
    • Related-key cryptanalysis of the full AES-192 and AES-256
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Biryukov, A., Khovratovich, D.: Related-key cryptanalysis of the full AES-192 and AES-256. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 1-18. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 1-18
    • Biryukov, A.1    Khovratovich, D.2
  • 7
    • 70350346078 scopus 로고    scopus 로고
    • Distinguisher and related-key attack on the full AES-256
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Biryukov, A., Khovratovich, D., Nikolić, I.: Distinguisher and related-key attack on the full AES-256. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 231-249. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 231-249
    • Biryukov, A.1    Khovratovich, D.2    Nikolić, I.3
  • 9
    • 77954646661 scopus 로고    scopus 로고
    • Automatic search for related-key differential characteristics in byte-oriented block ciphers: Application to AES, camellia, khazad and others
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Biryukov, A., Nikolić, I.: Automatic search for related-key differential characteristics in byte-oriented block ciphers: Application to AES, camellia, khazad and others. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 322-344. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 322-344
    • Biryukov, A.1    Nikolić, I.2
  • 10
    • 51049092732 scopus 로고    scopus 로고
    • Hash functions and RFID tags: Mind the gap
    • Oswald, E., Rohatgi, P. (eds.) CHES 2008. Springer, Heidelberg
    • Bogdanov, A., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y.: Hash functions and RFID tags: Mind the gap. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 283-299. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5154 , pp. 283-299
    • Bogdanov, A.1    Leander, G.2    Paar, C.3    Poschmann, A.4    Robshaw, M.J.B.5    Seurin, Y.6
  • 11
    • 51849105110 scopus 로고    scopus 로고
    • Preimages for reduced SHA-0 and SHA-1
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • De Cannière, C., Rechberger, C.: Preimages for reduced SHA-0 and SHA-1. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 179-202. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 179-202
    • De Cannière, C.1    Rechberger, C.2
  • 13
    • 50249150254 scopus 로고    scopus 로고
    • A meet-in-the-middle attack on 8-round AES
    • Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
    • Demirci, H., Selçuk, A.A.: A meet-in-the-middle attack on 8-round AES. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 116-126. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5086 , pp. 116-126
    • Demirci, H.1    Selçuk, A.A.2
  • 14
    • 79959983406 scopus 로고    scopus 로고
    • The effects of the omission of last round's MixColumns on AES
    • ePrint Archive, Report 2010/041
    • Dunkelman, O., Keller, N.: The effects of the omission of last round's MixColumns on AES. Cryptology ePrint Archive, Report 2010/041 (2010), http://eprint.iacr.org/2010/041
    • (2010) Cryptology
    • Dunkelman, O.1    Keller, N.2
  • 15
    • 78650817425 scopus 로고    scopus 로고
    • Improved single-key attacks on 8-round AES-192 and AES-256
    • Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
    • Dunkelman, O., Keller, N., Shamir, A.: Improved single-key attacks on 8-round AES-192 and AES-256. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 158-176. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6477 , pp. 158-176
    • Dunkelman, O.1    Keller, N.2    Shamir, A.3
  • 16
    • 12444346059 scopus 로고    scopus 로고
    • A collision attack on 7 rounds Rijndael
    • Springer, Heidelberg
    • Gilbert, H., Minier, M.: A collision attack on 7 rounds Rijndael. In: Third AES Candidate Conference (AES3), pp. 230-241. Springer, Heidelberg (2000)
    • (2000) Third AES Candidate Conference (AES3) , pp. 230-241
    • Gilbert, H.1    Minier, M.2
  • 17
    • 77954698821 scopus 로고    scopus 로고
    • Super-sbox cryptanalysis: Improved attacks for AES-like permutations
    • Hong, S., Iwata, T. (eds.) FSE 2010. Springer, Heidelberg
    • Gilbert, H., Peyrin, T.: Super-sbox cryptanalysis: Improved attacks for AES-like permutations. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 365-383. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6147 , pp. 365-383
    • Gilbert, H.1    Peyrin, T.2
  • 18
    • 78650822495 scopus 로고    scopus 로고
    • Advanced meet-in-the-middle preimage attacks: First results on full tiger, and improved results on MD4 and SHA-2
    • Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
    • Guo, J., Ling, S., Rechberger, C., Wang, H.: Advanced meet-in-the-middle preimage attacks: First results on full tiger, and improved results on MD4 and SHA-2. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 56-75. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6477 , pp. 56-75
    • Guo, J.1    Ling, S.2    Rechberger, C.3    Wang, H.4
  • 19
    • 70349881815 scopus 로고    scopus 로고
    • Preimages for reduced-round tiger
    • Lucks, S., Sadeghi, A.-R., Wolf, C. (eds.) WEWoRC 2007. Springer, Heidelberg
    • Indesteege, S., Preneel, B.: Preimages for reduced-round tiger. In: Lucks, S., Sadeghi, A.-R., Wolf, C. (eds.) WEWoRC 2007. LNCS, vol. 4945, pp. 90-99. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4945 , pp. 90-99
    • Indesteege, S.1    Preneel, B.2
  • 20
    • 24944541563 scopus 로고    scopus 로고
    • n work
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • n work. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 474-490. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 474-490
    • Kelsey, J.1    Schneier, B.2
  • 21
    • 38149128144 scopus 로고    scopus 로고
    • Known-key distinguishers for some block ciphers
    • Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
    • Knudsen, L.R., Rijmen, V.: Known-key distinguishers for some block ciphers. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 315-324. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 315-324
    • Knudsen, L.R.1    Rijmen, V.2
  • 22
    • 70549109284 scopus 로고    scopus 로고
    • Rebound distinguishers: Results on the full whirlpool compression function
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Lamberger, M., Mendel, F., Rechberger, C., Rijmen, V., Schläffer,M.: Rebound distinguishers: Results on the full whirlpool compression function. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 126-143. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 126-143
    • Lamberger, M.1    Mendel, F.2    Rechberger, C.3    Rijmen, V.4    Schläffer, M.5
  • 23
    • 78649983628 scopus 로고    scopus 로고
    • The rebound attack and subspace distinguishers: Application to Whirlpool
    • ePrint Archive, Report 2010/198
    • Lamberger, M., Mendel, F., Rechberger, C., Rijmen, V., Schläffer, M.: The rebound attack and subspace distinguishers: Application to Whirlpool. Cryptology ePrint Archive, Report 2010/198 (2010), http://eprint.iacr.org/2010/ 198
    • (2010) Cryptology
    • Lamberger, M.1    Mendel, F.2    Rechberger, C.3    Rijmen, V.4    Schläffer, M.5
  • 24
    • 50249175901 scopus 로고    scopus 로고
    • MD4 is not one-way
    • Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
    • Leurent, G.: MD4 is not one-way. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 412-428. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5086 , pp. 412-428
    • Leurent, G.1
  • 25
    • 58549091917 scopus 로고    scopus 로고
    • New impossible differential attacks on AES
    • Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. Springer, Heidelberg
    • Lu, J., Dunkelman, O., Keller, N., Kim, J.-S.: New impossible differential attacks on AES. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 279-293. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5365 , pp. 279-293
    • Lu, J.1    Dunkelman, O.2    Keller, N.3    Kim, J.-S.4
  • 26
    • 70549111559 scopus 로고    scopus 로고
    • Improved cryptanalysis of the reduced grøstl compression function, ECHO permutation and AES block cipher
    • Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. Springer, Heidelberg
    • Mendel, F., Peyrin, T., Rechberger, C., Schläffer, M.: Improved cryptanalysis of the reduced grøstl compression function, ECHO permutation and AES block cipher. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 16-35. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5867 , pp. 16-35
    • Mendel, F.1    Peyrin, T.2    Rechberger, C.3    Schläffer, M.4
  • 27
    • 70350398631 scopus 로고    scopus 로고
    • The rebound attack: Cryptanalysis of reduced whirlpool and grøstl
    • Dunkelman, O. (ed.) FSE 2009. Springer, Heidelberg
    • Mendel, F., Rechberger, C., Schläffer, M., Thomsen, S.S.: The rebound attack: Cryptanalysis of reduced whirlpool and grøstl. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 260-276. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5665 , pp. 260-276
    • Mendel, F.1    Rechberger, C.2    Schläffer, M.3    Thomsen, S.S.4
  • 29
    • 85026897539 scopus 로고
    • Hash functions based on block ciphers: A synthetic approach
    • Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
    • Preneel, B., Govaerts, R., Vandewalle, J.: Hash functions based on block ciphers: A synthetic approach. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 368-378. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 368-378
    • Preneel, B.1    Govaerts, R.2    Vandewalle, J.3
  • 31
    • 58349091571 scopus 로고    scopus 로고
    • Preimage attacks on 3, 4, and 5-pass HAVAL
    • Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
    • Sasaki, Y., Aoki, K.: Preimage attacks on 3, 4, and 5-pass HAVAL. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 253-271. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5350 , pp. 253-271
    • Sasaki, Y.1    Aoki, K.2
  • 32
    • 67650679771 scopus 로고    scopus 로고
    • Finding preimages in full MD5 faster than exhaustive search
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Sasaki, Y., Aoki, K.: Finding preimages in full MD5 faster than exhaustive search. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 134-152. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 134-152
    • Sasaki, Y.1    Aoki, K.2
  • 33
    • 70350754096 scopus 로고    scopus 로고
    • Blockcipher-based hashing revisited
    • Dunkelman, O. (ed.) FSE 2009. Springer, Heidelberg
    • Stam, M.: Blockcipher-based hashing revisited. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 67-83. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5665 , pp. 67-83
    • Stam, M.1
  • 34
    • 84965066515 scopus 로고    scopus 로고
    • Specification for the Advanced Encryption Standard (AES)
    • U.S. Department of Commerce
    • U.S. Department of Commerce, National Institute of Standards and Technology. Specification for the ADVANCED ENCRYPTION STANDARD (AES) (Federal Information Processing Standards Publication 197) (2001), http://csrc.nist.gov/ encryption/aes/index.html#fips
    • (2001) Federal Information Processing Standards Publication , vol.197
  • 35
    • 79959960972 scopus 로고    scopus 로고
    • U.S. Department of Commerce, Friday, November 2, 2007/Notices
    • U.S. Department of Commerce, National Institute of Standards and Technology. Federal Register /Vol. 72, No. 212/Friday, November 2, 2007/Notices (2007), http://csrc.nist.gov/groups/ST/hash/documents/FR-Notice-Nov07.pdf
    • (2007) Federal Register , vol.72 , Issue.212
  • 36
    • 79959956832 scopus 로고    scopus 로고
    • Meet-in-the-middle attack on 8 rounds of AES block cipher under 192 key bits
    • ePrint Archive, Report 2010/537 (appeared in the accepted papers list of ISPEC 2011)
    • Wei, Y., Lu, J., Hu, Y.: Meet-in-the-middle attack on 8 rounds of AES block cipher under 192 key bits. Cryptology ePrint Archive, Report 2010/537 (2010), http://eprint.iacr.org/2010/537 (appeared in the accepted papers list of ISPEC 2011)
    • (2010) Cryptology
    • Wei, Y.1    Lu, J.2    Hu, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.