Cryptanalysis Taskforce

Automatic Tools for Cryptanalysis

Summary

Mixed-Integer-Linear-Programming (MILP) was used to improve the cube key-recovery attack against Keccak-based constructions [SGSL18] and 8-round AES hashing modes [BDG+21].

References

[SGSL18] Ling Song, Jian Guo, Danping Shi, San Ling: New MILP Modeling: Improved Conditional Cube Attacks on Keccak-Based Constructions. ASIACRYPT (2) 2018: 65-95

[SG18] Ling Song, Jian Guo: Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP. IACR Trans. Symmetric Cryptol. 2018(3): 182-214 (2018)

[BDG+21] Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang: Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. EUROCRYPT 2021