Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework

Computer aided cryptanalysis has been popular for recent several years, however, most of these automations are semi-automations which leave cryptographers to complete the remaining parts of the attack. This paper proposes an automatic framework towards optimal meet-in-the-middle attack with splice-a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Designs, codes, and cryptography codes, and cryptography, 2023-09, Vol.91 (9), p.2845-2878
Hauptverfasser: Zhang, Kai, Lai, Xuejia, Wang, Lei, Guan, Jie, Hu, Bin, Wang, Senpeng, Shi, Tairong
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2878
container_issue 9
container_start_page 2845
container_title Designs, codes, and cryptography
container_volume 91
creator Zhang, Kai
Lai, Xuejia
Wang, Lei
Guan, Jie
Hu, Bin
Wang, Senpeng
Shi, Tairong
description Computer aided cryptanalysis has been popular for recent several years, however, most of these automations are semi-automations which leave cryptographers to complete the remaining parts of the attack. This paper proposes an automatic framework towards optimal meet-in-the-middle attack with splice-and-cut technique(MITM-SCT). Compared with other automations on MITM attack, our framework is fully automatic which can take all the procedures of the attack into consideration. Firstly, with a newly introduced matrix-based method, a general framework is proposed to calculate the correlated states and illustrate the differential diffusion property in a MITM attack. Alongside, all the procedures of a typical MITM-SCT attack are reduced to three types of matrices. These matrices can be uniquely determined by the round function and the construction methods are presented. Secondly, based on the framework, a fully automatic searching method on MITM-SCT attack is proposed. Thirdly, an optimal searching strategy on MITM-SCT attack is proposed and the bound for the time complexity is illustrated. Based on our method, if the computing capability is large enough, we can search all the possible attack scenarios and the least upper bound for the target block cipher against MITM-SCT attack can be derived. That is to say, we cannot only find some better attack scenarios, but also try all the possible attack scenarios simultaneously to find the optimal ones for some cases. Finally, we apply our method to HIGHT, CHAM, WARP and derive some currently best-known MITM attacks on these ciphers. For HIGHT, we exhaustively search about 2.1 billion attack scenarios and derive 76.8 thousand 23-round MITM attacks on HIGHT, which is 4 rounds more than the current best MITM attack. For the CHAM family ciphers, some MITM attacks are proposed on 30-round, 19-round, 30-round CHAM-64/128, CHAM-128/128 and CHAM-128/256 respectively. These results can exceed most of the attacks in the single key setting proposed by the designers. For WARP, a concrete 19-round MITM attack is proposed. Our automatic method is proposed on solving the problem of MITM attacks on ARX ciphers, however, the successful attack on WARP indicates that our method can also be applied to Sbox-based block ciphers.
doi_str_mv 10.1007/s10623-023-01226-4
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2858381024</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2858381024</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-755854da9882941907e7731e66e25fbf9c1404f4c9057494a68a120c46f9190e3</originalsourceid><addsrcrecordid>eNp9kDtPxDAQhC0EEsfBH6CyRG1YvxK7RCdeEogGCirLOM5d7vI4bEcn_j2OgkRHsdrmm9nZQeiSwjUFKG8ihYJxAtNQxgoijtCCypKTUqriGC1AM0koMHaKzmLcAgDlwBbo48X7RJqepI0nXVNVrcc2Jet2-NCkDY77tnGe2L4ibkw4ebfpm68xQ32FLV773gfbYjumobOpcbgOtvOHIezO0Ult2-gvfvcSvd_fva0eyfPrw9Pq9pk4TnXK-aSSorJaKaYF1VD6suTUF4Vnsv6staMCRC2cBlkKLWyhLGXgRFHrTHu-RFez7z4MOVhMZjuMoc8nDVNScZW_FpliM-XCEGPwtdmHprPh21AwU4VmrtDANFOFZhLxWRQz3K99-LP-R_UDY2ByeQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2858381024</pqid></control><display><type>article</type><title>Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework</title><source>Springer Nature - Complete Springer Journals</source><creator>Zhang, Kai ; Lai, Xuejia ; Wang, Lei ; Guan, Jie ; Hu, Bin ; Wang, Senpeng ; Shi, Tairong</creator><creatorcontrib>Zhang, Kai ; Lai, Xuejia ; Wang, Lei ; Guan, Jie ; Hu, Bin ; Wang, Senpeng ; Shi, Tairong</creatorcontrib><description>Computer aided cryptanalysis has been popular for recent several years, however, most of these automations are semi-automations which leave cryptographers to complete the remaining parts of the attack. This paper proposes an automatic framework towards optimal meet-in-the-middle attack with splice-and-cut technique(MITM-SCT). Compared with other automations on MITM attack, our framework is fully automatic which can take all the procedures of the attack into consideration. Firstly, with a newly introduced matrix-based method, a general framework is proposed to calculate the correlated states and illustrate the differential diffusion property in a MITM attack. Alongside, all the procedures of a typical MITM-SCT attack are reduced to three types of matrices. These matrices can be uniquely determined by the round function and the construction methods are presented. Secondly, based on the framework, a fully automatic searching method on MITM-SCT attack is proposed. Thirdly, an optimal searching strategy on MITM-SCT attack is proposed and the bound for the time complexity is illustrated. Based on our method, if the computing capability is large enough, we can search all the possible attack scenarios and the least upper bound for the target block cipher against MITM-SCT attack can be derived. That is to say, we cannot only find some better attack scenarios, but also try all the possible attack scenarios simultaneously to find the optimal ones for some cases. Finally, we apply our method to HIGHT, CHAM, WARP and derive some currently best-known MITM attacks on these ciphers. For HIGHT, we exhaustively search about 2.1 billion attack scenarios and derive 76.8 thousand 23-round MITM attacks on HIGHT, which is 4 rounds more than the current best MITM attack. For the CHAM family ciphers, some MITM attacks are proposed on 30-round, 19-round, 30-round CHAM-64/128, CHAM-128/128 and CHAM-128/256 respectively. These results can exceed most of the attacks in the single key setting proposed by the designers. For WARP, a concrete 19-round MITM attack is proposed. Our automatic method is proposed on solving the problem of MITM attacks on ARX ciphers, however, the successful attack on WARP indicates that our method can also be applied to Sbox-based block ciphers.</description><identifier>ISSN: 0925-1022</identifier><identifier>EISSN: 1573-7586</identifier><identifier>DOI: 10.1007/s10623-023-01226-4</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Coding and Information Theory ; Computer Science ; Cryptography ; Cryptology ; Discrete Mathematics in Computer Science ; Encryption ; Search methods ; Upper bounds</subject><ispartof>Designs, codes, and cryptography, 2023-09, Vol.91 (9), p.2845-2878</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-755854da9882941907e7731e66e25fbf9c1404f4c9057494a68a120c46f9190e3</citedby><cites>FETCH-LOGICAL-c319t-755854da9882941907e7731e66e25fbf9c1404f4c9057494a68a120c46f9190e3</cites><orcidid>0000-0002-6550-6518</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s10623-023-01226-4$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s10623-023-01226-4$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Zhang, Kai</creatorcontrib><creatorcontrib>Lai, Xuejia</creatorcontrib><creatorcontrib>Wang, Lei</creatorcontrib><creatorcontrib>Guan, Jie</creatorcontrib><creatorcontrib>Hu, Bin</creatorcontrib><creatorcontrib>Wang, Senpeng</creatorcontrib><creatorcontrib>Shi, Tairong</creatorcontrib><title>Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework</title><title>Designs, codes, and cryptography</title><addtitle>Des. Codes Cryptogr</addtitle><description>Computer aided cryptanalysis has been popular for recent several years, however, most of these automations are semi-automations which leave cryptographers to complete the remaining parts of the attack. This paper proposes an automatic framework towards optimal meet-in-the-middle attack with splice-and-cut technique(MITM-SCT). Compared with other automations on MITM attack, our framework is fully automatic which can take all the procedures of the attack into consideration. Firstly, with a newly introduced matrix-based method, a general framework is proposed to calculate the correlated states and illustrate the differential diffusion property in a MITM attack. Alongside, all the procedures of a typical MITM-SCT attack are reduced to three types of matrices. These matrices can be uniquely determined by the round function and the construction methods are presented. Secondly, based on the framework, a fully automatic searching method on MITM-SCT attack is proposed. Thirdly, an optimal searching strategy on MITM-SCT attack is proposed and the bound for the time complexity is illustrated. Based on our method, if the computing capability is large enough, we can search all the possible attack scenarios and the least upper bound for the target block cipher against MITM-SCT attack can be derived. That is to say, we cannot only find some better attack scenarios, but also try all the possible attack scenarios simultaneously to find the optimal ones for some cases. Finally, we apply our method to HIGHT, CHAM, WARP and derive some currently best-known MITM attacks on these ciphers. For HIGHT, we exhaustively search about 2.1 billion attack scenarios and derive 76.8 thousand 23-round MITM attacks on HIGHT, which is 4 rounds more than the current best MITM attack. For the CHAM family ciphers, some MITM attacks are proposed on 30-round, 19-round, 30-round CHAM-64/128, CHAM-128/128 and CHAM-128/256 respectively. These results can exceed most of the attacks in the single key setting proposed by the designers. For WARP, a concrete 19-round MITM attack is proposed. Our automatic method is proposed on solving the problem of MITM attacks on ARX ciphers, however, the successful attack on WARP indicates that our method can also be applied to Sbox-based block ciphers.</description><subject>Algorithms</subject><subject>Coding and Information Theory</subject><subject>Computer Science</subject><subject>Cryptography</subject><subject>Cryptology</subject><subject>Discrete Mathematics in Computer Science</subject><subject>Encryption</subject><subject>Search methods</subject><subject>Upper bounds</subject><issn>0925-1022</issn><issn>1573-7586</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><recordid>eNp9kDtPxDAQhC0EEsfBH6CyRG1YvxK7RCdeEogGCirLOM5d7vI4bEcn_j2OgkRHsdrmm9nZQeiSwjUFKG8ihYJxAtNQxgoijtCCypKTUqriGC1AM0koMHaKzmLcAgDlwBbo48X7RJqepI0nXVNVrcc2Jet2-NCkDY77tnGe2L4ibkw4ebfpm68xQ32FLV773gfbYjumobOpcbgOtvOHIezO0Ult2-gvfvcSvd_fva0eyfPrw9Pq9pk4TnXK-aSSorJaKaYF1VD6suTUF4Vnsv6staMCRC2cBlkKLWyhLGXgRFHrTHu-RFez7z4MOVhMZjuMoc8nDVNScZW_FpliM-XCEGPwtdmHprPh21AwU4VmrtDANFOFZhLxWRQz3K99-LP-R_UDY2ByeQ</recordid><startdate>20230901</startdate><enddate>20230901</enddate><creator>Zhang, Kai</creator><creator>Lai, Xuejia</creator><creator>Wang, Lei</creator><creator>Guan, Jie</creator><creator>Hu, Bin</creator><creator>Wang, Senpeng</creator><creator>Shi, Tairong</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-6550-6518</orcidid></search><sort><creationdate>20230901</creationdate><title>Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework</title><author>Zhang, Kai ; Lai, Xuejia ; Wang, Lei ; Guan, Jie ; Hu, Bin ; Wang, Senpeng ; Shi, Tairong</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-755854da9882941907e7731e66e25fbf9c1404f4c9057494a68a120c46f9190e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Algorithms</topic><topic>Coding and Information Theory</topic><topic>Computer Science</topic><topic>Cryptography</topic><topic>Cryptology</topic><topic>Discrete Mathematics in Computer Science</topic><topic>Encryption</topic><topic>Search methods</topic><topic>Upper bounds</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhang, Kai</creatorcontrib><creatorcontrib>Lai, Xuejia</creatorcontrib><creatorcontrib>Wang, Lei</creatorcontrib><creatorcontrib>Guan, Jie</creatorcontrib><creatorcontrib>Hu, Bin</creatorcontrib><creatorcontrib>Wang, Senpeng</creatorcontrib><creatorcontrib>Shi, Tairong</creatorcontrib><collection>CrossRef</collection><jtitle>Designs, codes, and cryptography</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhang, Kai</au><au>Lai, Xuejia</au><au>Wang, Lei</au><au>Guan, Jie</au><au>Hu, Bin</au><au>Wang, Senpeng</au><au>Shi, Tairong</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework</atitle><jtitle>Designs, codes, and cryptography</jtitle><stitle>Des. Codes Cryptogr</stitle><date>2023-09-01</date><risdate>2023</risdate><volume>91</volume><issue>9</issue><spage>2845</spage><epage>2878</epage><pages>2845-2878</pages><issn>0925-1022</issn><eissn>1573-7586</eissn><abstract>Computer aided cryptanalysis has been popular for recent several years, however, most of these automations are semi-automations which leave cryptographers to complete the remaining parts of the attack. This paper proposes an automatic framework towards optimal meet-in-the-middle attack with splice-and-cut technique(MITM-SCT). Compared with other automations on MITM attack, our framework is fully automatic which can take all the procedures of the attack into consideration. Firstly, with a newly introduced matrix-based method, a general framework is proposed to calculate the correlated states and illustrate the differential diffusion property in a MITM attack. Alongside, all the procedures of a typical MITM-SCT attack are reduced to three types of matrices. These matrices can be uniquely determined by the round function and the construction methods are presented. Secondly, based on the framework, a fully automatic searching method on MITM-SCT attack is proposed. Thirdly, an optimal searching strategy on MITM-SCT attack is proposed and the bound for the time complexity is illustrated. Based on our method, if the computing capability is large enough, we can search all the possible attack scenarios and the least upper bound for the target block cipher against MITM-SCT attack can be derived. That is to say, we cannot only find some better attack scenarios, but also try all the possible attack scenarios simultaneously to find the optimal ones for some cases. Finally, we apply our method to HIGHT, CHAM, WARP and derive some currently best-known MITM attacks on these ciphers. For HIGHT, we exhaustively search about 2.1 billion attack scenarios and derive 76.8 thousand 23-round MITM attacks on HIGHT, which is 4 rounds more than the current best MITM attack. For the CHAM family ciphers, some MITM attacks are proposed on 30-round, 19-round, 30-round CHAM-64/128, CHAM-128/128 and CHAM-128/256 respectively. These results can exceed most of the attacks in the single key setting proposed by the designers. For WARP, a concrete 19-round MITM attack is proposed. Our automatic method is proposed on solving the problem of MITM attacks on ARX ciphers, however, the successful attack on WARP indicates that our method can also be applied to Sbox-based block ciphers.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s10623-023-01226-4</doi><tpages>34</tpages><orcidid>https://orcid.org/0000-0002-6550-6518</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 0925-1022
ispartof Designs, codes, and cryptography, 2023-09, Vol.91 (9), p.2845-2878
issn 0925-1022
1573-7586
language eng
recordid cdi_proquest_journals_2858381024
source Springer Nature - Complete Springer Journals
subjects Algorithms
Coding and Information Theory
Computer Science
Cryptography
Cryptology
Discrete Mathematics in Computer Science
Encryption
Search methods
Upper bounds
title Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T06%3A45%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Meet-in-the-middle%20attack%20with%20splice-and-cut%20technique%20and%20a%20general%20automatic%20framework&rft.jtitle=Designs,%20codes,%20and%20cryptography&rft.au=Zhang,%20Kai&rft.date=2023-09-01&rft.volume=91&rft.issue=9&rft.spage=2845&rft.epage=2878&rft.pages=2845-2878&rft.issn=0925-1022&rft.eissn=1573-7586&rft_id=info:doi/10.1007/s10623-023-01226-4&rft_dat=%3Cproquest_cross%3E2858381024%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2858381024&rft_id=info:pmid/&rfr_iscdi=true