Zhiyu Zhang, Shun Li, Siwei Sun, et al., “Meet-in-the-middle preimage attack on round-reduced Areion256,” Chinese Journal of Electronics, vol. 34, no. 3, pp. 1–10, 2025. DOI: 10.23919/cje.2024.00.043
Citation: Zhiyu Zhang, Shun Li, Siwei Sun, et al., “Meet-in-the-middle preimage attack on round-reduced Areion256,” Chinese Journal of Electronics, vol. 34, no. 3, pp. 1–10, 2025. DOI: 10.23919/cje.2024.00.043

Meet-in-the-Middle Preimage Attack on Round-Reduced Areion256

  • \rmAreion is a family of highly-efficient permutations proposed by Isobe et al. in the Annual Conference on Cryptographic Hardware and Embedded Systems (CHES) 2023, which is designed for short-(fixed)-input-length (SFIL) hash functions. In this paper, we study the preimage attack on \rmAreion\text-DM , an SFIL hash function based on \rmAreion permutation. Following the previous works of meet-in-the-middle (MITM) preimage attack, we proposed a new mixed integer linear programming-based automatic search model utilizing the linear combination of bytes from different chunks. We introduce a new attribute with new propagation rules, which could simplify the previous models. The new model reduces the number of variables and constraints of superposition technique. To search MITM attacks with lower memory, we add new constraints to limit the size of the stored list. We have identified new preimage attacks on 6-round and 5-round \rmAreion256\text-DM . In the case of \rmAreion256 without the final swap, our findings reveal novel preimage attacks on 7-round and 5-round configurations, demonstrating lower memory complexities compared to previous results.
  • loading

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return