Simplified MITM modeling for permutations: New (quantum) attacks
Meet-in-the-middle (MITM) is a general paradigm where internal states are computed along two independent paths (’forwards’ and ’backwards’) that are then matched. Over time, MITM attacks improved using more refined techniques and exploiting additional freedoms and structure, which makes it more involved to find and optimize such attacks. This has led to the use of detailed attack models for generic solvers to automatically search for improved attacks, notably a MILP model developed by Bao et al. at EUROCRYPT 2021. In this paper, we study a simpler MILP modeling combining a greatly reduced attack representation as input to the generic solver, together with a theoretical analysis that, for any solution, proves the existence and complexity of a detailed attack. This modeling allows to find both classical and quantum attacks on a broad class of cryptographic permutations. First, Present-like constructions, with the permutations from the Spongent hash functions: we improve the MITM step in distinguishers by up to 3 rounds. Second, AES-like designs: despite being much simpler than Bao et al.’s, our model allows to recover the best previous results. The only limitation is that we do not use degrees of freedom from the key schedule. Third, we show that the model can be extended to target more permutations, like Feistel networks. In this context we give new Guess-and-determine attacks on reduced Simpira v2 and Sparkle. Finally, using our model, we find several new quantum preimage and pseudo-preimage attacks (e.g. Haraka v2, Simpira v2 . . . ) targeting the same number of rounds as the classical attacks.
|, , , ,|
|Lecture Notes in Computer Science|
|42nd Annual International Cryptology Conference, CRYPTO 2022|
Schrottenloher, A.C, & Stevens, M.M.J. (2022). Simplified MITM modeling for permutations: New (quantum) attacks. In Advances in Cryptology - CRYPTO 2022 (pp. 717–747). doi:10.1007/978-3-031-15982-4_24