Sieve-in-the-Middle: Improved MITM Attacks View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2013

AUTHORS

Anne Canteaut , María Naya-Plasencia , Bastien Vayssière

ABSTRACT

This paper presents a new generic technique, named sieve-in-the-middle, which improves meet-in-the-middle attacks in the sense that it provides an attack on a higher number of rounds. Instead of selecting the key candidates by searching for a collision in an intermediate state which can be computed forwards and backwards, we look for the existence of valid transitions through some middle sbox. Combining this technique with short bicliques allows to freely add one or two more rounds with the same time complexity. Moreover, when the key size of the cipher is larger than its block size, we show how to build the bicliques by an improved technique which does not require any additional data (on the contrary to previous biclique attacks). These techniques apply to PRESENT, DES, PRINCE and AES, improving the previously known results on these four ciphers. In particular, our attack on PRINCE applies to 8 rounds (out of 12), instead of 6 in the previous cryptanalyses. Some results are also given for theoretically estimating the sieving probability provided by some inputs and outputs of a given sbox. More... »

PAGES

222-240

Book

TITLE

Advances in Cryptology – CRYPTO 2013

ISBN

978-3-642-40040-7
978-3-642-40041-4

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-40041-4_13

DOI

http://dx.doi.org/10.1007/978-3-642-40041-4_13

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1021348168


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Project-Team SECRET, Inria Paris-Rocquencourt, France", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Project-Team SECRET, Inria Paris-Rocquencourt, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Canteaut", 
        "givenName": "Anne", 
        "id": "sg:person.012730266023.08", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012730266023.08"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Project-Team SECRET, Inria Paris-Rocquencourt, France", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Project-Team SECRET, Inria Paris-Rocquencourt, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Naya-Plasencia", 
        "givenName": "Mar\u00eda", 
        "id": "sg:person.013206304341.94", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Universit\u00e9 de Versailles Saint-Quentin-en-Yvelines, France", 
          "id": "http://www.grid.ac/institutes/grid.12832.3a", 
          "name": [
            "Universit\u00e9 de Versailles Saint-Quentin-en-Yvelines, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Vayssi\u00e8re", 
        "givenName": "Bastien", 
        "id": "sg:person.016421023276.32", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016421023276.32"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2013", 
    "datePublishedReg": "2013-01-01", 
    "description": "This paper presents a new generic technique, named sieve-in-the-middle, which improves meet-in-the-middle attacks in the sense that it provides an attack on a higher number of rounds. Instead of selecting the key candidates by searching for a collision in an intermediate state which can be computed forwards and backwards, we look for the existence of valid transitions through some middle sbox. Combining this technique with short bicliques allows to freely add one or two more rounds with the same time complexity. Moreover, when the key size of the cipher is larger than its block size, we show how to build the bicliques by an improved technique which does not require any additional data (on the contrary to previous biclique attacks). These techniques apply to PRESENT, DES, PRINCE and AES, improving the previously known results on these four ciphers. In particular, our attack on PRINCE applies to 8 rounds (out of 12), instead of 6 in the previous cryptanalyses. Some results are also given for theoretically estimating the sieving probability provided by some inputs and outputs of a given sbox.", 
    "editor": [
      {
        "familyName": "Canetti", 
        "givenName": "Ran", 
        "type": "Person"
      }, 
      {
        "familyName": "Garay", 
        "givenName": "Juan A.", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-40041-4_13", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-40040-7", 
        "978-3-642-40041-4"
      ], 
      "name": "Advances in Cryptology \u2013 CRYPTO 2013", 
      "type": "Book"
    }, 
    "keywords": [
      "same time complexity", 
      "time complexity", 
      "bicliques", 
      "generic technique", 
      "valid transitions", 
      "new generic technique", 
      "block size", 
      "technique", 
      "intermediate state", 
      "existence", 
      "key size", 
      "probability", 
      "complexity", 
      "collisions", 
      "transition", 
      "cipher", 
      "improved technique", 
      "cryptanalyses", 
      "sense", 
      "number", 
      "Sboxes", 
      "more rounds", 
      "size", 
      "results", 
      "input", 
      "output", 
      "state", 
      "additional data", 
      "meet", 
      "attacks", 
      "key candidates", 
      "middle attack", 
      "data", 
      "DES", 
      "rounds", 
      "candidates", 
      "AES", 
      "MITM attacks", 
      "sieves", 
      "middle", 
      "higher number", 
      "present", 
      "Prince", 
      "paper"
    ], 
    "name": "Sieve-in-the-Middle: Improved MITM Attacks", 
    "pagination": "222-240", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1021348168"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-40041-4_13"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-40041-4_13", 
      "https://app.dimensions.ai/details/publication/pub.1021348168"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-10-01T06:59", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221001/entities/gbq_results/chapter/chapter_448.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-40041-4_13"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-40041-4_13'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-40041-4_13'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-40041-4_13'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-40041-4_13'


 

This table displays all metadata directly associated to this object as RDF triples.

125 TRIPLES      22 PREDICATES      69 URIs      62 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-40041-4_13 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N0e9a965834754eea87500b0d4fdeadfe
4 schema:datePublished 2013
5 schema:datePublishedReg 2013-01-01
6 schema:description This paper presents a new generic technique, named sieve-in-the-middle, which improves meet-in-the-middle attacks in the sense that it provides an attack on a higher number of rounds. Instead of selecting the key candidates by searching for a collision in an intermediate state which can be computed forwards and backwards, we look for the existence of valid transitions through some middle sbox. Combining this technique with short bicliques allows to freely add one or two more rounds with the same time complexity. Moreover, when the key size of the cipher is larger than its block size, we show how to build the bicliques by an improved technique which does not require any additional data (on the contrary to previous biclique attacks). These techniques apply to PRESENT, DES, PRINCE and AES, improving the previously known results on these four ciphers. In particular, our attack on PRINCE applies to 8 rounds (out of 12), instead of 6 in the previous cryptanalyses. Some results are also given for theoretically estimating the sieving probability provided by some inputs and outputs of a given sbox.
7 schema:editor Nb5356b18a35a40d387080cdc69066195
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N32160e77abdb4804a3ad52b3764fb073
11 schema:keywords AES
12 DES
13 MITM attacks
14 Prince
15 Sboxes
16 additional data
17 attacks
18 bicliques
19 block size
20 candidates
21 cipher
22 collisions
23 complexity
24 cryptanalyses
25 data
26 existence
27 generic technique
28 higher number
29 improved technique
30 input
31 intermediate state
32 key candidates
33 key size
34 meet
35 middle
36 middle attack
37 more rounds
38 new generic technique
39 number
40 output
41 paper
42 present
43 probability
44 results
45 rounds
46 same time complexity
47 sense
48 sieves
49 size
50 state
51 technique
52 time complexity
53 transition
54 valid transitions
55 schema:name Sieve-in-the-Middle: Improved MITM Attacks
56 schema:pagination 222-240
57 schema:productId N32456122297042a384d0bd7e7785dce9
58 Neb89de1b47ab4aa49fd3ec50409a035f
59 schema:publisher Nac122ecaebbf4f29ab6ea25b1b731ff5
60 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021348168
61 https://doi.org/10.1007/978-3-642-40041-4_13
62 schema:sdDatePublished 2022-10-01T06:59
63 schema:sdLicense https://scigraph.springernature.com/explorer/license/
64 schema:sdPublisher Nd26c068c72fd44358682e2f035449f4c
65 schema:url https://doi.org/10.1007/978-3-642-40041-4_13
66 sgo:license sg:explorer/license/
67 sgo:sdDataset chapters
68 rdf:type schema:Chapter
69 N076756ad2fb34a0eafe93319d69d5061 rdf:first Nbae3882da3224f6796f22b822cc943bc
70 rdf:rest rdf:nil
71 N0cabd5f6989d41529d4e3d97d77e9840 rdf:first sg:person.013206304341.94
72 rdf:rest N63a11d2287ac4f3a8878943292e74e40
73 N0e9a965834754eea87500b0d4fdeadfe rdf:first sg:person.012730266023.08
74 rdf:rest N0cabd5f6989d41529d4e3d97d77e9840
75 N32160e77abdb4804a3ad52b3764fb073 schema:isbn 978-3-642-40040-7
76 978-3-642-40041-4
77 schema:name Advances in Cryptology – CRYPTO 2013
78 rdf:type schema:Book
79 N32456122297042a384d0bd7e7785dce9 schema:name doi
80 schema:value 10.1007/978-3-642-40041-4_13
81 rdf:type schema:PropertyValue
82 N63a11d2287ac4f3a8878943292e74e40 rdf:first sg:person.016421023276.32
83 rdf:rest rdf:nil
84 Nabe1c57a07474e7a8761f734a412fffc schema:familyName Canetti
85 schema:givenName Ran
86 rdf:type schema:Person
87 Nac122ecaebbf4f29ab6ea25b1b731ff5 schema:name Springer Nature
88 rdf:type schema:Organisation
89 Nb5356b18a35a40d387080cdc69066195 rdf:first Nabe1c57a07474e7a8761f734a412fffc
90 rdf:rest N076756ad2fb34a0eafe93319d69d5061
91 Nbae3882da3224f6796f22b822cc943bc schema:familyName Garay
92 schema:givenName Juan A.
93 rdf:type schema:Person
94 Nd26c068c72fd44358682e2f035449f4c schema:name Springer Nature - SN SciGraph project
95 rdf:type schema:Organization
96 Neb89de1b47ab4aa49fd3ec50409a035f schema:name dimensions_id
97 schema:value pub.1021348168
98 rdf:type schema:PropertyValue
99 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
100 schema:name Information and Computing Sciences
101 rdf:type schema:DefinedTerm
102 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
103 schema:name Data Format
104 rdf:type schema:DefinedTerm
105 sg:person.012730266023.08 schema:affiliation grid-institutes:None
106 schema:familyName Canteaut
107 schema:givenName Anne
108 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012730266023.08
109 rdf:type schema:Person
110 sg:person.013206304341.94 schema:affiliation grid-institutes:None
111 schema:familyName Naya-Plasencia
112 schema:givenName María
113 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94
114 rdf:type schema:Person
115 sg:person.016421023276.32 schema:affiliation grid-institutes:grid.12832.3a
116 schema:familyName Vayssière
117 schema:givenName Bastien
118 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016421023276.32
119 rdf:type schema:Person
120 grid-institutes:None schema:alternateName Project-Team SECRET, Inria Paris-Rocquencourt, France
121 schema:name Project-Team SECRET, Inria Paris-Rocquencourt, France
122 rdf:type schema:Organization
123 grid-institutes:grid.12832.3a schema:alternateName Université de Versailles Saint-Quentin-en-Yvelines, France
124 schema:name Université de Versailles Saint-Quentin-en-Yvelines, France
125 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...