Cryptology ePrint Archive: Report 2021/1119

Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials

Xiaoyang Dong and Zhiyu Zhang and Siwei Sun and Congming Wei and Xiaoyun Wang and Lei Hu

Abstract: Collision attacks on AES-like hashing (hash functions constructed by plugging AES-like ciphers or permutations into the famous PGV modes or their variants) can be reduced to the problem of finding a pair of inputs respecting a differential of the underlying AES-like primitive whose input and output differences are the same. The rebound attack due to Mendel et al. is a powerful tool for achieving this goal, whose quantum version was first considered by Hosoyamada and Sasaki at EUROCRYPT 2020. In this work, we automate the process of searching for the configurations of rebound attacks by taking related-key differentials of the underlying block cipher into account with the MILP-based approach. In the quantum setting, our model guide the search towards characteristics that minimize the resources (e.g., QRAM) and complexities of the resulting rebound attacks. We apply our method to Saturnin-hash, SKINNY, and Whirlpool and improved results are obtained.

Category / Keywords: secret-key cryptography / Quantum computation, Collision attacks, Rebound attacks, Saturnin, SKINNY, Whirlpool, MILP

Original Publication (with major differences): IACR-ASIACRYPT-2021

Date: received 2 Sep 2021, last revised 3 Sep 2021

Contact author: xiaoyangdong at tsinghua edu cn, zhangzhiyu at iie ac cn, siweisun isaac at gmail com, wcm16 at tsinghua edu cn, xiaoyunwang at tsinghua edu cn, hulei at iie ac cn

Available format(s): PDF | BibTeX Citation

Version: 20210903:072908 (All versions of this report)

Short URL: ia.cr/2021/1119


[ Cryptology ePrint archive ]