Paper 2025/1203

Breaking The Authenticated Encryption scheme HiAE

Xichao Hu, State Key Laboratory of Cryptology, Beijing, China
Lin Jiao, State Key Laboratory of Cryptology, Beijing, China
Dengguo Feng, State Key Laboratory of Cryptology, Beijing, China
Yonglin Hao, State Key Laboratory of Cryptology, Beijing, China
Senpeng Wang, Information Engineering University, Zhengzhou, China
Yongqiang Li, Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China
Xinxin Gong, State Key Laboratory of Cryptology, Beijing, China
Abstract

HiAE is the fastest AEAD solution on ARM chips to date, utilizing AES round functions while also setting a new performance benchmark on the latest x86 processors. In this paper, we employ algebraic techniques to investigate the security of HiAE. Our findings reveal that HiAE is vulnerable. Firstly, we employ the meet-in-the-middle technique and guess-and-determine technique to recover the state and derive a key-related equation resulting from two layers of AES round functions. Secondly, by adopting an algebraic approach to study the properties of the round function, we decompose the equation into byte-level equations for divide-and-conquer. Finally, we utilize the guess-and-determine technique to recover the key. Collectively, these techniques enable us to present the first full key-recovery attack on HiAE. Our attack achieves a data complexity of $2^{130}$ and a time complexity of approximately $2^{209}$, leveraging both encryption and decryption oracles with a success probability of 1. In a single-key and nonce-respecting scenario, the attack fully recovers the 256-bit key, breaking the claimed 256-bit security against key-recovery attacks.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
HiAEAlgebraic attackMeet-in-the-middleGuess-and-determine
Contact author(s)
xchao_h @ 163 com
jiaolin_jl @ 126 com
History
2025-06-30: approved
2025-06-27: received
See all versions
Short URL
https://ia.cr/2025/1203
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/1203,
      author = {Xichao Hu and Lin Jiao and Dengguo Feng and Yonglin Hao and Senpeng Wang and Yongqiang Li and Xinxin Gong},
      title = {Breaking The Authenticated Encryption scheme {HiAE}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/1203},
      year = {2025},
      url = {https://eprint.iacr.org/2025/1203}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.