February 08, 2022. André Schrottenloher

Title: Meet-in-the-middle Attacks on Permutations: Simplified Cell-based 
Modeling and Quantum Attacks

Abstract: Meet-in-the-middle (MITM) is a general cryptanalytic technique 
where internal states are computed along two independent paths 
(‘forwards’ and ‘backwards’) and then matched. Over time, MITM attacks 
improved using more refined techniques and exploiting additional freedoms 
and structure, which makes it more involved to find and optimize them. 
This has led to the use of detailed attack models for generic solvers to 
automatically search for improved attacks.
In this paper, we propose a simple MILP modeling for MITM attacks 
on permutations, with applications to preimage attacks on hash functions. 
We benefit from a greatly simplified model and a theoretical analysis 
that, for any solution, proves the existence of a detailed attack and its 
complexity. This model yields new results on several families of constructions.
First, we improve the MITM step in distinguishers on the permutations
 of the Spongent hash functions. Second, on AES-based permutation designs,
 our model recovers the best previous results despite being much simpler. 
The only limitation is that we do not use degrees of freedom from the key 
schedule in AES-based hashing. Third, we extend the model to target more 
permutations, like Feistel networks. Here we give generic guess-and-determine 
distinguishers with complexity 1 which target up to 2/3 of the rounds of Simpira v2, 
preimage attacks on reduced versions of Simpira v2 and practical distinguishers 
on reduced-round Sparkle permutations.
Finally, we extend our model to find quantum MITM attacks, and we give several 
quantum preimage attacks on reduced-round hash functions (e.g. Haraka v2, Simpira v2).

Joint work with Marc Stevens (Cryptology Group, CWI)

Slides:

Comments are closed.