Preimage security evaluations on Rijndael-based hashing: a comprehensive study

The Meet-in-the-Middle (MITM) attack is one of the most powerful cryptanalysis techniques, as seen by its use in preimage attacks on MD4, MD5, Tiger, HAVAL, and Haraka-512 v2 hash functions and key recovery for full-round KTANTAN. An efficient approach to constructing MITM attacks is automation, whi...

Full description

Saved in:
Bibliographic Details
Main Author: Zhang, Tianyu
Other Authors: Guo Jian
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2023
Subjects:
Online Access:https://hdl.handle.net/10356/166491
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-166491
record_format dspace
spelling sg-ntu-dr.10356-1664912023-05-08T15:38:44Z Preimage security evaluations on Rijndael-based hashing: a comprehensive study Zhang, Tianyu Guo Jian School of Physical and Mathematical Sciences guojian@ntu.edu.sg Science::Mathematics::Discrete mathematics::Cryptography The Meet-in-the-Middle (MITM) attack is one of the most powerful cryptanalysis techniques, as seen by its use in preimage attacks on MD4, MD5, Tiger, HAVAL, and Haraka-512 v2 hash functions and key recovery for full-round KTANTAN. An efficient approach to constructing MITM attacks is automation, which refers to engraving MITM propagation characteristics into an optimization model and searching for the optimal configuration using optimizers. Our work focuses on the simplification and renovation of the most advanced superposition framework based on Mixed-Integer Linear Programming (MILP) proposed by Bao et al. in CRYPTO 2022. With our refined model, we provide the first comprehensive study of the preimage security of hash functions based on the Rijndael block cipher family, versions of which are chosen to be the Advanced Encryption Standard (AES) by NIST in 2001, and improve the best known results. Specifically, we have extended the attack rounds of Rijndael 256-192 and 256-192, reduced the attack complexity of Rijndael 256-128 and 128-192 (AES192), and filled the void of preimage security evaluation on Rijndael specifications with a 192-bit block size. In addition, a generic framework of quantum MITM attacks is given to extend our accomplishments in the classical setting to quantum. Bachelor of Science in Mathematical Sciences 2023-05-04T07:44:07Z 2023-05-04T07:44:07Z 2023 Final Year Project (FYP) Zhang, T. (2023). Preimage security evaluations on Rijndael-based hashing: a comprehensive study. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/166491 https://hdl.handle.net/10356/166491 en application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Science::Mathematics::Discrete mathematics::Cryptography
spellingShingle Science::Mathematics::Discrete mathematics::Cryptography
Zhang, Tianyu
Preimage security evaluations on Rijndael-based hashing: a comprehensive study
description The Meet-in-the-Middle (MITM) attack is one of the most powerful cryptanalysis techniques, as seen by its use in preimage attacks on MD4, MD5, Tiger, HAVAL, and Haraka-512 v2 hash functions and key recovery for full-round KTANTAN. An efficient approach to constructing MITM attacks is automation, which refers to engraving MITM propagation characteristics into an optimization model and searching for the optimal configuration using optimizers. Our work focuses on the simplification and renovation of the most advanced superposition framework based on Mixed-Integer Linear Programming (MILP) proposed by Bao et al. in CRYPTO 2022. With our refined model, we provide the first comprehensive study of the preimage security of hash functions based on the Rijndael block cipher family, versions of which are chosen to be the Advanced Encryption Standard (AES) by NIST in 2001, and improve the best known results. Specifically, we have extended the attack rounds of Rijndael 256-192 and 256-192, reduced the attack complexity of Rijndael 256-128 and 128-192 (AES192), and filled the void of preimage security evaluation on Rijndael specifications with a 192-bit block size. In addition, a generic framework of quantum MITM attacks is given to extend our accomplishments in the classical setting to quantum.
author2 Guo Jian
author_facet Guo Jian
Zhang, Tianyu
format Final Year Project
author Zhang, Tianyu
author_sort Zhang, Tianyu
title Preimage security evaluations on Rijndael-based hashing: a comprehensive study
title_short Preimage security evaluations on Rijndael-based hashing: a comprehensive study
title_full Preimage security evaluations on Rijndael-based hashing: a comprehensive study
title_fullStr Preimage security evaluations on Rijndael-based hashing: a comprehensive study
title_full_unstemmed Preimage security evaluations on Rijndael-based hashing: a comprehensive study
title_sort preimage security evaluations on rijndael-based hashing: a comprehensive study
publisher Nanyang Technological University
publishDate 2023
url https://hdl.handle.net/10356/166491
_version_ 1770564491810963456