Improved division property based cube attacks exploiting algebraic properties of superpoly

Y Hao, T Isobe, L Jiao, C Li, W Meier… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
At CRYPTO 2017 and IEEE Transactions on Computers in 2018, Todo et al. proposed the
division property based cube attack method making it possible to launch cube attacks with …

MILP-based differential attack on round-reduced GIFT

B Zhu, X Dong, H Yu - Topics in Cryptology–CT-RSA 2019: The …, 2019 - Springer
Abstract At Asiacrypt 2014, Sun et al. proposed a MILP model [20] to search for differential
characteristics of bit-oriented block ciphers. In this paper, we improve this model to search …

Automatic search of meet-in-the-middle preimage attacks on AES-like hashing

Z Bao, X Dong, J Guo, Z Li, D Shi, S Sun… - Advances in Cryptology …, 2021 - Springer
Abstract The Meet-in-the-Middle (MITM) preimage attack is highly effective in breaking the
preimage resistance of many hash functions, including but not limited to the full MD5 …

Algebraic attacks on round-reduced Keccak

F Liu, T Isobe, W Meier, Z Yang - … , ACISP 2021, Virtual Event, December 1 …, 2021 - Springer
Since Keccak was selected as the SHA-3 standard, both its hash mode and keyed mode
have attracted lots of third-party cryptanalysis. Especially in recent years, there is progress in …

Preimage Attacks on Round-Reduced Keccak-224/256 via an Allocating Approach

T Li, Y Sun - Annual International Conference on the Theory and …, 2019 - Springer
We present new preimage attacks on standard Keccak-224 and Keccak-256 that are
reduced to 3 and 4 rounds. An allocating approach is used in the attacks, and the whole …

TurboSHAKE

G Bertoni, J Daemen, S Hoffert, M Peeters… - Cryptology ePrint …, 2023 - eprint.iacr.org
In a recent presentation, we promoted the use of 12-round instances of Keccak, collectively
called “TurboSHAKE”, in post-quantum cryptographic schemes, but without defining them …

A practical key-recovery attack on 805-round trivium

CD Ye, T Tian - International Conference on the Theory and …, 2021 - Springer
The cube attack is one of the most important cryptanalytic techniques against Trivium. Many
key-recovery attacks based on cube attacks have been established. However, few attacks …

New MILP modeling: improved conditional cube attacks on Keccak-based constructions

L Song, J Guo, D Shi, S Ling - … 2018: 24th International Conference on the …, 2018 - Springer
In this paper, we propose a new MILP modeling to find better or even optimal choices of
conditional cubes, under the general framework of conditional cube attacks. These choices …

Related-key differential cryptanalysis of the reduced-round block cipher GIFT

M Cao, W Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
GIFT is a lightweight block cipher that was proposed by Banik et al. at CHES 2017, which is
said to be a direct improvement over PRESENT since “that provides a much increased …

Massive Superpoly Recovery with a Meet-in-the-Middle Framework: Improved Cube Attacks on Trivium and Kreyvium

J He, K Hu, H Lei, M Wang - … International Conference on the Theory and …, 2024 - Springer
The cube attack extracts the information of secret key bits by recovering the coefficient called
superpoly in the output bit with respect to a subset of plaintexts/IV, which is called a cube …