2011
DOI: 10.1007/978-3-642-22792-9_11
|View full text |Cite
|
Sign up to set email alerts
|

How to Improve Rebound Attacks

Abstract: Abstract. Rebound attacks are a state-of-the-art analysis method for hash functions. These cryptanalysis methods are based on a well chosen differential path and have been applied to several hash functions from the SHA-3 competition, providing the best known analysis in these cases. In this paper we study rebound attacks in detail and find for a large number of cases that the complexities of existing attacks can be improved. This is done by identifying problems that optimally adapt to the cryptanalytic situati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
53
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 41 publications
(54 citation statements)
references
References 15 publications
1
53
0
Order By: Relevance
“…Also, the bottleneck of our attack is now p match . Using the techniques presented in [22] could help reducing the complexity of it. …”
Section: Results and Conclusionmentioning
confidence: 99%
“…Also, the bottleneck of our attack is now p match . Using the techniques presented in [22] could help reducing the complexity of it. …”
Section: Results and Conclusionmentioning
confidence: 99%
“…In order to find solutions for the middle rounds (see Figure 4), we propose an algorithm inspired by the ones in [20,21]. As in [7,14], instead of dealing with the classical t 2 parallel c-bit SubBytes SBox applications, one can consider t parallel tc-bit SBoxes (named SuperSBoxes) each composed of two SBox layers surrounding one MixCells and one AddRoundConstant function.…”
Section: Finding a Conforming Pairmentioning
confidence: 99%
“…Since most rebound-based attacks actually required many such pairs, this was not much of a constraint. In parallel, other improvements on the truncated differential paths utilized [25] or on methods to merge lists [21] were proposed.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Several improvements have appeared through the new analyses, like startfrom-the-middle attack [22] or Super-SBoxes [13,19], which allow to control three rounds in the middle, multinbounds [21] which extend the number of rounds analyzed by a better use of the freedom degrees (better ways of merging the inbounds were proposed in [24]), or non-fully-active states [27] that permits to reduce the complexity of the outbound part. In [17], a method for controlling four rounds in the middle with high complexity was proposed, and it allows to reach a total of 9 rounds with regards to distinguishers in the case of a large permutation size.…”
Section: Introductionmentioning
confidence: 99%