Replication data for: Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes (doi:10.21979/N9/JYECIO)

View:

Part 1: Document Description
Part 2: Study Description
Part 5: Other Study-Related Materials
Entire Codebook

(external link)

Document Description

Citation

Title:

Replication data for: Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes

Identification Number:

doi:10.21979/N9/JYECIO

Distributor:

DR-NTU (Data)

Date of Distribution:

2020-08-02

Version:

1

Bibliographic Citation:

Zhenzhen Bao; Ling Ding; Jian Guo; Haoyang Wang; Wenying Zhang, 2020, "Replication data for: Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes", https://doi.org/10.21979/N9/JYECIO, DR-NTU (Data), V1

Study Description

Citation

Title:

Replication data for: Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes

Identification Number:

doi:10.21979/N9/JYECIO

Authoring Entity:

Zhenzhen Bao (Nanyang Technological University)

Ling Ding (Department of Computer Science and Engineering, Shanghai Jiao Tong University, China)

Jian Guo (Nanyang Technological University)

Haoyang Wang (Nanyang Technological University)

Wenying Zhang (School of Information Science and Engineering, Shandong Normal University, Jinan 250014, China)

Software used in Production:

unknown

Grant Number:

M4062510.J30

Grant Number:

M4082123

Grant Number:

M4012049

Grant Number:

M4012153

Grant Number:

M4020466

Grant Number:

61672330

Distributor:

DR-NTU (Data)

Access Authority:

Wang Haoyang

Depositor:

Wang Haoyang

Date of Deposit:

2020-08-02

Holdings Information:

https://doi.org/10.21979/N9/JYECIO

Study Scope

Keywords:

Computer and Information Science, Computer and Information Science, AES, MITM, preimage, hashing mode, key schedule

Abstract:

Hashing modes are ways to convert a block cipher into a hash function, and those with AES as the underlying block cipher are referred to as AES hashing modes. Sasaki in 2011 introduced the first preimage attack against AES hashing modes with the AES block cipher reduced to 7 rounds, by the method of meet-in-the-middle. In his attack, the key schedules are not taken into account, hence the same attack applies to all three versions of AES. In this paper, by introducing neutral bits from key, extra degrees of freedom are gained, which are utilized in two ways, i.e., to reduce the time complexity and to extend the attack to more rounds. As an immediate result, the complexities of 7-round pseudo-preimage attacks are reduced from 2^120 to 2^112, 2^96, and 2^96 for AES-128, AES-192, and AES-256, respectively. By carefully choosing the neutral bits from key to cancel those from state, the attack is extended to 8 rounds for AES-192 and AES-256 with complexities 2^120 and 2^96. Similar results are obtained for Kiasu-BC, a tweakable block cipher based on AES-128, and interestingly the additional input tweak helps reduce the attack complexities further. To the best of our knowledge, these are the first preimage attacks against 8-round AES hashing modes.

Kind of Data:

codes

Methodology and Processing

Sources Statement

Data Access

Other Study Description Materials

Related Publications

Citation

Identification Number:

10.13154/tosc.v2019.i4.318-347

Bibliographic Citation:

Bao, Z., Ding, L., Guo, J., Wang, H., and Zhang, W. (2020). Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes. IACR Transactions on Symmetric Cryptology, 2019(4), 318-347.

Other Study-Related Materials

Label:

AES128_7R_FW_Eq_Sol.txt

Notes:

text/plain

Other Study-Related Materials

Label:

AES128_7R_FW_Eq.txt

Notes:

text/plain

Other Study-Related Materials

Label:

AES192_8R_FW_Eq_Sol.txt

Notes:

text/plain

Other Study-Related Materials

Label:

AES192_8R_FW_Eq.txt

Notes:

text/plain