ATProto Browser

ATProto Browser

Experimental browser for the Atmosphere

Post

A Scrutiny of the Security of AES-based Hashing and One-way Functions (Shiyao Chen, Jian Guo, Eik List, Danping Shi, Tianyu Zhang) ia.cr/2025/792

May 5, 2025, 2:04 AM

Record data

{
  "uri": "at://did:plc:fwa55bujvdrwlwlwgqmmxmuf/app.bsky.feed.post/3lofbpcd6pq2m",
  "cid": "bafyreidksffocseczghldps7f2zambor76orem6p7dsbplmzpup7srrdli",
  "value": {
    "text": "A Scrutiny of the Security of AES-based Hashing and One-way Functions (Shiyao Chen, Jian Guo, Eik List, Danping Shi, Tianyu Zhang) ia.cr/2025/792",
    "$type": "app.bsky.feed.post",
    "embed": {
      "$type": "app.bsky.embed.images",
      "images": [
        {
          "alt": "Abstract. AES has cemented its position as the primary symmetric-key primitive for a wide range of cryptographic applications, which motivates the analysis on the concrete security of AES’s instantiations in practice, for instance, the collision resistance of AES-based hashing, the key commitment security of AES-based authenticated encryption schemes, and the one-wayness of AES-based one-way functions in ZK and MPC protocols. In this work, we introduce single-color initial structures into meet-in-the-middle (MITM) attacks, a systematic technique to identify attack trails that enable efficient neutral word generation and low-memory attacks. As a result, we have attained: (1) the first classical one-block collision attack on 7-round AES-MMO/MP, marking the first advancement in attack rounds for more than a decade and matching the attack rounds in the quantum setting; (2) the first one-block collision attack on 4-round AES-128-DM, which bridges the gap in Taiyama et al.’s claim at Asiacrypt 2024 from an MITM perspective; (3) the first improvement in single known plaintext key recovery attack on 5-round AES-128 in over a decade; (4) comprehensive results on the security margin of Rijndael-192 and Rijndael-256 in multiple instantiations. These breakthroughs deepen our understanding of AES-like structure, and contribute as a scrutiny of the security of AES-based instantiations.\n",
          "image": {
            "$type": "blob",
            "ref": {
              "$link": "bafkreies7rydhcjnkj623cjz6mtynuvrqlfaq45p5zbsiq6df5hk26zlcu"
            },
            "mimeType": "image/png",
            "size": 104560
          },
          "aspectRatio": {
            "width": 1200,
            "height": 800
          }
        },
        {
          "alt": "Image showing part 2 of abstract.",
          "image": {
            "$type": "blob",
            "ref": {
              "$link": "bafkreidzg2aypykpoqccufrghuzfysmpszkmjnj65a3r42geevohxgbhla"
            },
            "mimeType": "image/png",
            "size": 31719
          },
          "aspectRatio": {
            "width": 1200,
            "height": 800
          }
        }
      ]
    },
    "facets": [
      {
        "index": {
          "byteEnd": 145,
          "byteStart": 131
        },
        "features": [
          {
            "uri": "https://ia.cr/2025/792",
            "$type": "app.bsky.richtext.facet#link"
          }
        ]
      }
    ],
    "createdAt": "2025-05-05T02:04:05.565365Z"
  }
}