June 6, 2023, 8:54 a.m. |

IACR News www.iacr.org

ePrint Report: Simplified Modeling of MITM Attacks for Block Ciphers: new (Quantum) Attacks

André Schrottenloher, Marc Stevens


The meet-in-the-middle (MITM) technique has led to many key-recovery attacks on block ciphers and preimage attacks on hash functions. MITM attacks aim at finding efficiently the internal states conforming to a constrained computational path in the given design. The path is split into two independent computations (forward and backward) which are performed separately and then matched pairwise.


Nowadays, cryptographers use automatic tools that …

aim attacks block ciphers eprint report functions hash hash functions internal key led mitm modeling quantum recovery report states

Cyber Security Engineer I

@ Fortress Security Risk Management | Cleveland, OH, United States

Senior DevSecOps Engineer

@ Wisk Aero | Remote United States

Vulnerable Adult Investigator - Vice President

@ JPMorgan Chase & Co. | Chicago, IL, United States

Consultant Réseaux IT Digital Impulse - H/F

@ Talan | Paris, France

DevSecOps Engineer (Onsite)

@ Accenture Federal Services | Arlington, VA

Senior Security Engineer

@ Minitab | State College, Pennsylvania, United States