Paper 2022/1057

Rebound Attacks on SKINNY Hashing with Automatic Tools

Shun Li, Nanyang Technological University
Guozhen Liu, Nanyang Technological University
Phuong Pham, Nanyang Technological University
Abstract

In ToSC'20, a new approach combining Mix-Integer Linear Programming (MILP) tool and Constraint Programming (CP) tool to search for boomerang distinguishers is proposed and later used for rebound attack in ASIACRYPT'21 and CRYPTO'22. In this work, we extend these techniques to mount collision attacks on SKINNY-128-256 MMO hashing mode in classical and quantum settings. The first results of 17-round (and 15-round) free-start collision attack on this variant of SKINNY hashing mode are presented. Moreover, one more round of the inbound phase is covered leading to the best existing classical free-start collision attack of 19-round on the SKINNY-128-384 MMO hashing.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Published elsewhere. NSS 2022
DOI
10.1007/978-3-031-23020-2
Keywords
Collision attacksRebound attacksQuantum computationConstraint programmingSKINNY hashing
Contact author(s)
shun li @ ntu edu sg
guozhen liu @ ntu edu sg
pham0079 @ e ntu edu sg
History
2023-01-09: revised
2022-08-15: received
See all versions
Short URL
https://ia.cr/2022/1057
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2022/1057,
      author = {Shun Li and Guozhen Liu and Phuong Pham},
      title = {Rebound Attacks on {SKINNY} Hashing with Automatic Tools},
      howpublished = {Cryptology {ePrint} Archive, Paper 2022/1057},
      year = {2022},
      doi = {10.1007/978-3-031-23020-2},
      url = {https://eprint.iacr.org/2022/1057}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.