Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
Computer aided cryptanalysis has been popular for recent several years, however, most of these automations are semi-automations which leave cryptographers to complete the remaining parts of the attack. This paper proposes an automatic framework towards optimal meet-in-the-middle attack with splice-a...
Gespeichert in:
Veröffentlicht in: | Designs, codes, and cryptography codes, and cryptography, 2023-09, Vol.91 (9), p.2845-2878 |
---|---|
Hauptverfasser: | , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2878 |
---|---|
container_issue | 9 |
container_start_page | 2845 |
container_title | Designs, codes, and cryptography |
container_volume | 91 |
creator | Zhang, Kai Lai, Xuejia Wang, Lei Guan, Jie Hu, Bin Wang, Senpeng Shi, Tairong |
description | Computer aided cryptanalysis has been popular for recent several years, however, most of these automations are semi-automations which leave cryptographers to complete the remaining parts of the attack. This paper proposes an automatic framework towards optimal meet-in-the-middle attack with splice-and-cut technique(MITM-SCT). Compared with other automations on MITM attack, our framework is fully automatic which can take all the procedures of the attack into consideration. Firstly, with a newly introduced matrix-based method, a general framework is proposed to calculate the correlated states and illustrate the differential diffusion property in a MITM attack. Alongside, all the procedures of a typical MITM-SCT attack are reduced to three types of matrices. These matrices can be uniquely determined by the round function and the construction methods are presented. Secondly, based on the framework, a fully automatic searching method on MITM-SCT attack is proposed. Thirdly, an optimal searching strategy on MITM-SCT attack is proposed and the bound for the time complexity is illustrated. Based on our method, if the computing capability is large enough, we can search all the possible attack scenarios and the least upper bound for the target block cipher against MITM-SCT attack can be derived. That is to say, we cannot only find some better attack scenarios, but also try all the possible attack scenarios simultaneously to find the optimal ones for some cases. Finally, we apply our method to HIGHT, CHAM, WARP and derive some currently best-known MITM attacks on these ciphers. For HIGHT, we exhaustively search about 2.1 billion attack scenarios and derive 76.8 thousand 23-round MITM attacks on HIGHT, which is 4 rounds more than the current best MITM attack. For the CHAM family ciphers, some MITM attacks are proposed on 30-round, 19-round, 30-round CHAM-64/128, CHAM-128/128 and CHAM-128/256 respectively. These results can exceed most of the attacks in the single key setting proposed by the designers. For WARP, a concrete 19-round MITM attack is proposed. Our automatic method is proposed on solving the problem of MITM attacks on ARX ciphers, however, the successful attack on WARP indicates that our method can also be applied to Sbox-based block ciphers. |
doi_str_mv | 10.1007/s10623-023-01226-4 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2858381024</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2858381024</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-755854da9882941907e7731e66e25fbf9c1404f4c9057494a68a120c46f9190e3</originalsourceid><addsrcrecordid>eNp9kDtPxDAQhC0EEsfBH6CyRG1YvxK7RCdeEogGCirLOM5d7vI4bEcn_j2OgkRHsdrmm9nZQeiSwjUFKG8ihYJxAtNQxgoijtCCypKTUqriGC1AM0koMHaKzmLcAgDlwBbo48X7RJqepI0nXVNVrcc2Jet2-NCkDY77tnGe2L4ibkw4ebfpm68xQ32FLV773gfbYjumobOpcbgOtvOHIezO0Ult2-gvfvcSvd_fva0eyfPrw9Pq9pk4TnXK-aSSorJaKaYF1VD6suTUF4Vnsv6staMCRC2cBlkKLWyhLGXgRFHrTHu-RFez7z4MOVhMZjuMoc8nDVNScZW_FpliM-XCEGPwtdmHprPh21AwU4VmrtDANFOFZhLxWRQz3K99-LP-R_UDY2ByeQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2858381024</pqid></control><display><type>article</type><title>Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework</title><source>Springer Nature - Complete Springer Journals</source><creator>Zhang, Kai ; Lai, Xuejia ; Wang, Lei ; Guan, Jie ; Hu, Bin ; Wang, Senpeng ; Shi, Tairong</creator><creatorcontrib>Zhang, Kai ; Lai, Xuejia ; Wang, Lei ; Guan, Jie ; Hu, Bin ; Wang, Senpeng ; Shi, Tairong</creatorcontrib><description>Computer aided cryptanalysis has been popular for recent several years, however, most of these automations are semi-automations which leave cryptographers to complete the remaining parts of the attack. This paper proposes an automatic framework towards optimal meet-in-the-middle attack with splice-and-cut technique(MITM-SCT). Compared with other automations on MITM attack, our framework is fully automatic which can take all the procedures of the attack into consideration. Firstly, with a newly introduced matrix-based method, a general framework is proposed to calculate the correlated states and illustrate the differential diffusion property in a MITM attack. Alongside, all the procedures of a typical MITM-SCT attack are reduced to three types of matrices. These matrices can be uniquely determined by the round function and the construction methods are presented. Secondly, based on the framework, a fully automatic searching method on MITM-SCT attack is proposed. Thirdly, an optimal searching strategy on MITM-SCT attack is proposed and the bound for the time complexity is illustrated. Based on our method, if the computing capability is large enough, we can search all the possible attack scenarios and the least upper bound for the target block cipher against MITM-SCT attack can be derived. That is to say, we cannot only find some better attack scenarios, but also try all the possible attack scenarios simultaneously to find the optimal ones for some cases. Finally, we apply our method to HIGHT, CHAM, WARP and derive some currently best-known MITM attacks on these ciphers. For HIGHT, we exhaustively search about 2.1 billion attack scenarios and derive 76.8 thousand 23-round MITM attacks on HIGHT, which is 4 rounds more than the current best MITM attack. For the CHAM family ciphers, some MITM attacks are proposed on 30-round, 19-round, 30-round CHAM-64/128, CHAM-128/128 and CHAM-128/256 respectively. These results can exceed most of the attacks in the single key setting proposed by the designers. For WARP, a concrete 19-round MITM attack is proposed. Our automatic method is proposed on solving the problem of MITM attacks on ARX ciphers, however, the successful attack on WARP indicates that our method can also be applied to Sbox-based block ciphers.</description><identifier>ISSN: 0925-1022</identifier><identifier>EISSN: 1573-7586</identifier><identifier>DOI: 10.1007/s10623-023-01226-4</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Coding and Information Theory ; Computer Science ; Cryptography ; Cryptology ; Discrete Mathematics in Computer Science ; Encryption ; Search methods ; Upper bounds</subject><ispartof>Designs, codes, and cryptography, 2023-09, Vol.91 (9), p.2845-2878</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-755854da9882941907e7731e66e25fbf9c1404f4c9057494a68a120c46f9190e3</citedby><cites>FETCH-LOGICAL-c319t-755854da9882941907e7731e66e25fbf9c1404f4c9057494a68a120c46f9190e3</cites><orcidid>0000-0002-6550-6518</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s10623-023-01226-4$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s10623-023-01226-4$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Zhang, Kai</creatorcontrib><creatorcontrib>Lai, Xuejia</creatorcontrib><creatorcontrib>Wang, Lei</creatorcontrib><creatorcontrib>Guan, Jie</creatorcontrib><creatorcontrib>Hu, Bin</creatorcontrib><creatorcontrib>Wang, Senpeng</creatorcontrib><creatorcontrib>Shi, Tairong</creatorcontrib><title>Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework</title><title>Designs, codes, and cryptography</title><addtitle>Des. Codes Cryptogr</addtitle><description>Computer aided cryptanalysis has been popular for recent several years, however, most of these automations are semi-automations which leave cryptographers to complete the remaining parts of the attack. This paper proposes an automatic framework towards optimal meet-in-the-middle attack with splice-and-cut technique(MITM-SCT). Compared with other automations on MITM attack, our framework is fully automatic which can take all the procedures of the attack into consideration. Firstly, with a newly introduced matrix-based method, a general framework is proposed to calculate the correlated states and illustrate the differential diffusion property in a MITM attack. Alongside, all the procedures of a typical MITM-SCT attack are reduced to three types of matrices. These matrices can be uniquely determined by the round function and the construction methods are presented. Secondly, based on the framework, a fully automatic searching method on MITM-SCT attack is proposed. Thirdly, an optimal searching strategy on MITM-SCT attack is proposed and the bound for the time complexity is illustrated. Based on our method, if the computing capability is large enough, we can search all the possible attack scenarios and the least upper bound for the target block cipher against MITM-SCT attack can be derived. That is to say, we cannot only find some better attack scenarios, but also try all the possible attack scenarios simultaneously to find the optimal ones for some cases. Finally, we apply our method to HIGHT, CHAM, WARP and derive some currently best-known MITM attacks on these ciphers. For HIGHT, we exhaustively search about 2.1 billion attack scenarios and derive 76.8 thousand 23-round MITM attacks on HIGHT, which is 4 rounds more than the current best MITM attack. For the CHAM family ciphers, some MITM attacks are proposed on 30-round, 19-round, 30-round CHAM-64/128, CHAM-128/128 and CHAM-128/256 respectively. These results can exceed most of the attacks in the single key setting proposed by the designers. For WARP, a concrete 19-round MITM attack is proposed. Our automatic method is proposed on solving the problem of MITM attacks on ARX ciphers, however, the successful attack on WARP indicates that our method can also be applied to Sbox-based block ciphers.</description><subject>Algorithms</subject><subject>Coding and Information Theory</subject><subject>Computer Science</subject><subject>Cryptography</subject><subject>Cryptology</subject><subject>Discrete Mathematics in Computer Science</subject><subject>Encryption</subject><subject>Search methods</subject><subject>Upper bounds</subject><issn>0925-1022</issn><issn>1573-7586</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><recordid>eNp9kDtPxDAQhC0EEsfBH6CyRG1YvxK7RCdeEogGCirLOM5d7vI4bEcn_j2OgkRHsdrmm9nZQeiSwjUFKG8ihYJxAtNQxgoijtCCypKTUqriGC1AM0koMHaKzmLcAgDlwBbo48X7RJqepI0nXVNVrcc2Jet2-NCkDY77tnGe2L4ibkw4ebfpm68xQ32FLV773gfbYjumobOpcbgOtvOHIezO0Ult2-gvfvcSvd_fva0eyfPrw9Pq9pk4TnXK-aSSorJaKaYF1VD6suTUF4Vnsv6staMCRC2cBlkKLWyhLGXgRFHrTHu-RFez7z4MOVhMZjuMoc8nDVNScZW_FpliM-XCEGPwtdmHprPh21AwU4VmrtDANFOFZhLxWRQz3K99-LP-R_UDY2ByeQ</recordid><startdate>20230901</startdate><enddate>20230901</enddate><creator>Zhang, Kai</creator><creator>Lai, Xuejia</creator><creator>Wang, Lei</creator><creator>Guan, Jie</creator><creator>Hu, Bin</creator><creator>Wang, Senpeng</creator><creator>Shi, Tairong</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-6550-6518</orcidid></search><sort><creationdate>20230901</creationdate><title>Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework</title><author>Zhang, Kai ; Lai, Xuejia ; Wang, Lei ; Guan, Jie ; Hu, Bin ; Wang, Senpeng ; Shi, Tairong</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-755854da9882941907e7731e66e25fbf9c1404f4c9057494a68a120c46f9190e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Algorithms</topic><topic>Coding and Information Theory</topic><topic>Computer Science</topic><topic>Cryptography</topic><topic>Cryptology</topic><topic>Discrete Mathematics in Computer Science</topic><topic>Encryption</topic><topic>Search methods</topic><topic>Upper bounds</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhang, Kai</creatorcontrib><creatorcontrib>Lai, Xuejia</creatorcontrib><creatorcontrib>Wang, Lei</creatorcontrib><creatorcontrib>Guan, Jie</creatorcontrib><creatorcontrib>Hu, Bin</creatorcontrib><creatorcontrib>Wang, Senpeng</creatorcontrib><creatorcontrib>Shi, Tairong</creatorcontrib><collection>CrossRef</collection><jtitle>Designs, codes, and cryptography</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhang, Kai</au><au>Lai, Xuejia</au><au>Wang, Lei</au><au>Guan, Jie</au><au>Hu, Bin</au><au>Wang, Senpeng</au><au>Shi, Tairong</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework</atitle><jtitle>Designs, codes, and cryptography</jtitle><stitle>Des. Codes Cryptogr</stitle><date>2023-09-01</date><risdate>2023</risdate><volume>91</volume><issue>9</issue><spage>2845</spage><epage>2878</epage><pages>2845-2878</pages><issn>0925-1022</issn><eissn>1573-7586</eissn><abstract>Computer aided cryptanalysis has been popular for recent several years, however, most of these automations are semi-automations which leave cryptographers to complete the remaining parts of the attack. This paper proposes an automatic framework towards optimal meet-in-the-middle attack with splice-and-cut technique(MITM-SCT). Compared with other automations on MITM attack, our framework is fully automatic which can take all the procedures of the attack into consideration. Firstly, with a newly introduced matrix-based method, a general framework is proposed to calculate the correlated states and illustrate the differential diffusion property in a MITM attack. Alongside, all the procedures of a typical MITM-SCT attack are reduced to three types of matrices. These matrices can be uniquely determined by the round function and the construction methods are presented. Secondly, based on the framework, a fully automatic searching method on MITM-SCT attack is proposed. Thirdly, an optimal searching strategy on MITM-SCT attack is proposed and the bound for the time complexity is illustrated. Based on our method, if the computing capability is large enough, we can search all the possible attack scenarios and the least upper bound for the target block cipher against MITM-SCT attack can be derived. That is to say, we cannot only find some better attack scenarios, but also try all the possible attack scenarios simultaneously to find the optimal ones for some cases. Finally, we apply our method to HIGHT, CHAM, WARP and derive some currently best-known MITM attacks on these ciphers. For HIGHT, we exhaustively search about 2.1 billion attack scenarios and derive 76.8 thousand 23-round MITM attacks on HIGHT, which is 4 rounds more than the current best MITM attack. For the CHAM family ciphers, some MITM attacks are proposed on 30-round, 19-round, 30-round CHAM-64/128, CHAM-128/128 and CHAM-128/256 respectively. These results can exceed most of the attacks in the single key setting proposed by the designers. For WARP, a concrete 19-round MITM attack is proposed. Our automatic method is proposed on solving the problem of MITM attacks on ARX ciphers, however, the successful attack on WARP indicates that our method can also be applied to Sbox-based block ciphers.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s10623-023-01226-4</doi><tpages>34</tpages><orcidid>https://orcid.org/0000-0002-6550-6518</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0925-1022 |
ispartof | Designs, codes, and cryptography, 2023-09, Vol.91 (9), p.2845-2878 |
issn | 0925-1022 1573-7586 |
language | eng |
recordid | cdi_proquest_journals_2858381024 |
source | Springer Nature - Complete Springer Journals |
subjects | Algorithms Coding and Information Theory Computer Science Cryptography Cryptology Discrete Mathematics in Computer Science Encryption Search methods Upper bounds |
title | Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T06%3A45%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Meet-in-the-middle%20attack%20with%20splice-and-cut%20technique%20and%20a%20general%20automatic%20framework&rft.jtitle=Designs,%20codes,%20and%20cryptography&rft.au=Zhang,%20Kai&rft.date=2023-09-01&rft.volume=91&rft.issue=9&rft.spage=2845&rft.epage=2878&rft.pages=2845-2878&rft.issn=0925-1022&rft.eissn=1573-7586&rft_id=info:doi/10.1007/s10623-023-01226-4&rft_dat=%3Cproquest_cross%3E2858381024%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2858381024&rft_id=info:pmid/&rfr_iscdi=true |