{"title":"圆缩减区域的中间交会预像攻击","authors":"Zhiyu Zhang;Shun Li;Siwei Sun;Caibing Wang;Lei Hu","doi":"10.23919/cje.2024.00.043","DOIUrl":null,"url":null,"abstract":"Areion is a family of highly-efficient permutations proposed by Isobe et al. in the Annual Conference on Cryptographic Hardware and Embedded Systems (CHES) 2023, which is designed for short-(fixed)-input-length (SFIL) hash functions. In this paper, we study the preimage attack on Areion-DM, an SFIL hash function based on Areion permutation. Following the previous works of meet-in-the-middle (MITM) preimage attack, we proposed a new mixed integer linear programming-based automatic search model utilizing the linear combination of bytes from different chunks. We introduce a new attribute with new propagation rules, which could simplify the previous models. The new model reduces the number of variables and constraints of superposition technique. To search MITM attacks with lower memory, we add new constraints to limit the size of the stored list. We have identified new preimage attacks on 6-round and 5-round Areion256-DM. In the case of Areion256 without the final swap, our findings reveal novel preimage attacks on 7-round and 5-round configurations, demonstrating lower memory complexities compared to previous results.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 3","pages":"839-848"},"PeriodicalIF":1.6000,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11060015","citationCount":"0","resultStr":"{\"title\":\"Meet-in-the-Middle Preimage Attack on Round-Reduced Areion256\",\"authors\":\"Zhiyu Zhang;Shun Li;Siwei Sun;Caibing Wang;Lei Hu\",\"doi\":\"10.23919/cje.2024.00.043\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Areion is a family of highly-efficient permutations proposed by Isobe et al. in the Annual Conference on Cryptographic Hardware and Embedded Systems (CHES) 2023, which is designed for short-(fixed)-input-length (SFIL) hash functions. In this paper, we study the preimage attack on Areion-DM, an SFIL hash function based on Areion permutation. Following the previous works of meet-in-the-middle (MITM) preimage attack, we proposed a new mixed integer linear programming-based automatic search model utilizing the linear combination of bytes from different chunks. We introduce a new attribute with new propagation rules, which could simplify the previous models. The new model reduces the number of variables and constraints of superposition technique. To search MITM attacks with lower memory, we add new constraints to limit the size of the stored list. We have identified new preimage attacks on 6-round and 5-round Areion256-DM. In the case of Areion256 without the final swap, our findings reveal novel preimage attacks on 7-round and 5-round configurations, demonstrating lower memory complexities compared to previous results.\",\"PeriodicalId\":50701,\"journal\":{\"name\":\"Chinese Journal of Electronics\",\"volume\":\"34 3\",\"pages\":\"839-848\"},\"PeriodicalIF\":1.6000,\"publicationDate\":\"2025-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11060015\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Chinese Journal of Electronics\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/11060015/\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Chinese Journal of Electronics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11060015/","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
Meet-in-the-Middle Preimage Attack on Round-Reduced Areion256
Areion is a family of highly-efficient permutations proposed by Isobe et al. in the Annual Conference on Cryptographic Hardware and Embedded Systems (CHES) 2023, which is designed for short-(fixed)-input-length (SFIL) hash functions. In this paper, we study the preimage attack on Areion-DM, an SFIL hash function based on Areion permutation. Following the previous works of meet-in-the-middle (MITM) preimage attack, we proposed a new mixed integer linear programming-based automatic search model utilizing the linear combination of bytes from different chunks. We introduce a new attribute with new propagation rules, which could simplify the previous models. The new model reduces the number of variables and constraints of superposition technique. To search MITM attacks with lower memory, we add new constraints to limit the size of the stored list. We have identified new preimage attacks on 6-round and 5-round Areion256-DM. In the case of Areion256 without the final swap, our findings reveal novel preimage attacks on 7-round and 5-round configurations, demonstrating lower memory complexities compared to previous results.
期刊介绍:
CJE focuses on the emerging fields of electronics, publishing innovative and transformative research papers. Most of the papers published in CJE are from universities and research institutes, presenting their innovative research results. Both theoretical and practical contributions are encouraged, and original research papers reporting novel solutions to the hot topics in electronics are strongly recommended.