Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing

Abstract: The Nostradamus attack was originally proposed as a security vulnerability for a hash function by Kelsey and Kohno at EUROCRYPT 2006. It requires the attacker to commit to a hash value y of an iterated hash function H. Subsequently, upon being provided with a message prefix P, the adversary’s task is to identify a suffix S such that H(P∥S) equals y. Kelsey and Kohno demonstrated a herding attack requiring O(√n · 22n/3) evaluations of the compression function of H, where n represents the output and state size of the hash, placing this attack between preimage attacks and collision searches in terms of complexity. At ASIACRYPT 2022, Benedikt et al. transform Kelsey and Kohno’s attack into a quantum variant, decreasing the time complexity from O(√n · 22n/3) to O( 3√n · 23n/7). At ToSC 2023, Zhang et al. proposed the first dedicated Nostradamus attack on AES-like hashing in both classical and quantum settings. In this paper, we have made revisions to the multi-target technique incorpora.... https://tosc.iacr.org/index.php/ToSC/article/view/11405

Standort
Deutsche Nationalbibliothek Frankfurt am Main
Umfang
Online-Ressource
Sprache
Englisch

Erschienen in
Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing ; volume:2024 ; number:1 ; year:2024
IACR transactions on symmetric cryptology ; 2024, Heft 1 (2024)

Urheber
Dong, Xiaoyang
Guo, Jian
Li, Shun
Pham, Phuong
Zhang, Tianyu

DOI
10.46586/tosc.v2024.i1.158-187
URN
urn:nbn:de:101:1-2024032017554251815747
Rechteinformation
Open Access; Der Zugriff auf das Objekt ist unbeschränkt möglich.
Letzte Aktualisierung
14.08.2025, 10:45 MESZ

Datenpartner

Dieses Objekt wird bereitgestellt von:
Deutsche Nationalbibliothek. Bei Fragen zum Objekt wenden Sie sich bitte an den Datenpartner.

Beteiligte

  • Dong, Xiaoyang
  • Guo, Jian
  • Li, Shun
  • Pham, Phuong
  • Zhang, Tianyu

Ähnliche Objekte (12)