International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials

Authors:
Xiaoyang Dong , Institute for Advanced Study, BNRist, Tsinghua University, Beijing, China
Zhiyu Zhang , State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China.
Siwei Sun , School of Cryptology, University of Chinese Academy of Sciences, Beijing, China.
Congming Wei , Institute for Advanced Study, BNRist, Tsinghua University, Beijing, China
Xiaoyun Wang , Institute for Advanced Study, BNRist, Tsinghua University, Beijing, China
Lei Hu , State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China.
Download:
DOI: 10.1007/978-3-030-92062-3_9
Search ePrint
Search Google
Conference: ASIACRYPT 2021
Abstract: Collision attacks on AES-like hashing (hash functions constructed by plugging AES-like ciphers or permutations into the famous PGV modes or their variants) can be reduced to the problem of finding a pair of inputs respecting a differential of the underlying AES-like primitive whose input and output differences are the same. The rebound attack due to Mendel et al. is a powerful tool for achieving this goal, whose quantum version was first considered by Hosoyamada and Sasaki at EUROCRYPT 2020. In this work, we automate the process of searching for the configurations of rebound attacks by taking related-key differentials of the underlying block cipher into account with the MILP-based approach. In the quantum setting, our model guide the search towards characteristics that minimize the resources (e.g., QRAM) and complexities of the resulting rebound attacks. We apply our method to Saturnin-hash, Skinny, and Whirlpool and improved results are obtained.
Video from ASIACRYPT 2021
BibTeX
@inproceedings{asiacrypt-2021-31412,
  title={Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials},
  publisher={Springer-Verlag},
  doi={10.1007/978-3-030-92062-3_9},
  author={Xiaoyang Dong and Zhiyu Zhang and Siwei Sun and Congming Wei and Xiaoyun Wang and Lei Hu},
  year=2021
}