Preimage security evaluations on Rijndael-based hashing: a comprehensive study
The Meet-in-the-Middle (MITM) attack is one of the most powerful cryptanalysis techniques, as seen by its use in preimage attacks on MD4, MD5, Tiger, HAVAL, and Haraka-512 v2 hash functions and key recovery for full-round KTANTAN. An efficient approach to constructing MITM attacks is automation, whi...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2023
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/166491 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-166491 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1664912023-05-08T15:38:44Z Preimage security evaluations on Rijndael-based hashing: a comprehensive study Zhang, Tianyu Guo Jian School of Physical and Mathematical Sciences guojian@ntu.edu.sg Science::Mathematics::Discrete mathematics::Cryptography The Meet-in-the-Middle (MITM) attack is one of the most powerful cryptanalysis techniques, as seen by its use in preimage attacks on MD4, MD5, Tiger, HAVAL, and Haraka-512 v2 hash functions and key recovery for full-round KTANTAN. An efficient approach to constructing MITM attacks is automation, which refers to engraving MITM propagation characteristics into an optimization model and searching for the optimal configuration using optimizers. Our work focuses on the simplification and renovation of the most advanced superposition framework based on Mixed-Integer Linear Programming (MILP) proposed by Bao et al. in CRYPTO 2022. With our refined model, we provide the first comprehensive study of the preimage security of hash functions based on the Rijndael block cipher family, versions of which are chosen to be the Advanced Encryption Standard (AES) by NIST in 2001, and improve the best known results. Specifically, we have extended the attack rounds of Rijndael 256-192 and 256-192, reduced the attack complexity of Rijndael 256-128 and 128-192 (AES192), and filled the void of preimage security evaluation on Rijndael specifications with a 192-bit block size. In addition, a generic framework of quantum MITM attacks is given to extend our accomplishments in the classical setting to quantum. Bachelor of Science in Mathematical Sciences 2023-05-04T07:44:07Z 2023-05-04T07:44:07Z 2023 Final Year Project (FYP) Zhang, T. (2023). Preimage security evaluations on Rijndael-based hashing: a comprehensive study. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/166491 https://hdl.handle.net/10356/166491 en application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Science::Mathematics::Discrete mathematics::Cryptography |
spellingShingle |
Science::Mathematics::Discrete mathematics::Cryptography Zhang, Tianyu Preimage security evaluations on Rijndael-based hashing: a comprehensive study |
description |
The Meet-in-the-Middle (MITM) attack is one of the most powerful cryptanalysis techniques, as seen by its use in preimage attacks on MD4, MD5, Tiger, HAVAL, and Haraka-512 v2 hash functions and key recovery for full-round KTANTAN. An efficient approach to constructing MITM attacks is automation, which refers to engraving MITM propagation characteristics into an optimization model and searching for the optimal configuration using optimizers. Our work focuses on the simplification and renovation of the most advanced superposition framework based on Mixed-Integer Linear Programming (MILP) proposed by Bao et al. in CRYPTO 2022. With our refined model, we provide the first comprehensive study of the preimage security of hash functions based on the Rijndael block cipher family, versions of which are chosen to be the Advanced Encryption Standard (AES) by NIST in 2001, and improve the best known results. Specifically, we have extended the attack rounds of Rijndael 256-192 and 256-192, reduced the attack complexity of Rijndael 256-128 and 128-192 (AES192), and filled the void of preimage security evaluation on Rijndael specifications with a 192-bit block size. In addition, a generic framework of quantum MITM attacks is given to extend our accomplishments in the classical setting to quantum. |
author2 |
Guo Jian |
author_facet |
Guo Jian Zhang, Tianyu |
format |
Final Year Project |
author |
Zhang, Tianyu |
author_sort |
Zhang, Tianyu |
title |
Preimage security evaluations on Rijndael-based hashing: a comprehensive study |
title_short |
Preimage security evaluations on Rijndael-based hashing: a comprehensive study |
title_full |
Preimage security evaluations on Rijndael-based hashing: a comprehensive study |
title_fullStr |
Preimage security evaluations on Rijndael-based hashing: a comprehensive study |
title_full_unstemmed |
Preimage security evaluations on Rijndael-based hashing: a comprehensive study |
title_sort |
preimage security evaluations on rijndael-based hashing: a comprehensive study |
publisher |
Nanyang Technological University |
publishDate |
2023 |
url |
https://hdl.handle.net/10356/166491 |
_version_ |
1770564491810963456 |