Please use this identifier to cite or link to this item:
Title: Improved meet-in-the-middle preimage attacks against AES hashing modes
Authors: Bao, Zhenzhen
Ding, Lin
Guo, Jian
Wang, Haoyang
Zhang, Wenying
Keywords: Library and information science::Cryptography
Issue Date: 2020
Source: Bao, Z., Ding, L., Guo, J., Wang, H., & Zhang, W. (2020). Improved meet-in-the-middle preimage attacks against AES hashing modes. IACR Transactions on Symmetric Cryptology, 2019(4), 318-347. doi:10.13154/tosc.v2019.i4.318-347
Project: M4062510.J30
Journal: IACR Transactions on Symmetric Cryptology
Abstract: Hashing modes are ways to convert a block cipher into a hash function, and those with AES as the underlying block cipher are referred to as AES hashing modes. Sasaki in 2011, introduced the first preimage attack against AES hashing modes with the AES block cipher reduced to 7 rounds, by the method of meet-in-the-middle. In his attack, the key-schedules are not taken into account. Hence, the same attack applies to all three versions of AES. In this paper, by introducing neutral bits from the key, extra degree of freedom is gained, which is utilized in two ways, i.e., to reduce the time complexity and to extend the attack to more rounds. As an immediate result, the complexities of 7-round pseudo-preimage attacks are reduced from 2^120 to 2^104, 2^96, and 2^96 for AES-128, AES-192, and AES-256, respectively. By carefully choosing the neutral bits from the key to cancel those from the state, the attack is extended to 8 rounds for AES-192 and AES-256 with complexities 2^112 and 2^96. Similar results are obtained for Kiasu-BC, a tweakable block cipher based on AES-128, and interestingly the additional input tweak helps reduce the complexity and extend the attack to one more round. To the best of our knowledge, these are the first preimage attacks against 8-round AES hashing modes.
ISSN: 2519-173X
DOI: 10.13154/tosc.v2019.i4.318-347
Schools: School of Physical and Mathematical Sciences 
Organisations: Strategic Centre for Research in Privacy-Preserving Technologies and Systems
Rights: © 2020 Zhenzhen Bao, Lin Ding, Jian Guo, Haoyang Wang, Wenying Zhang. This work is licensed under a Creative Commons Attribution 4.0 International License.
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:SPMS Journal Articles

Files in This Item:
File Description SizeFormat 
8467-Article Text-4903-2-10-20200324.pdf959.36 kBAdobe PDFThumbnail

Citations 20

Updated on Jul 11, 2024

Web of ScienceTM
Citations 20

Updated on Oct 24, 2023

Page view(s)

Updated on Jul 19, 2024

Download(s) 50

Updated on Jul 19, 2024

Google ScholarTM




Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.